Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 8.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2008-3856
The routine infrastructure component in IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP1 on Unix and Linux does not change the ownership of the db2fmp process, which has unknown impact and attack vectors.
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database
Ibm Db2 Universal Database 8
7.5
CVSSv2
CVE-2005-4737
IBM DB2 Universal Database (UDB) 820 before ESE AIX 5765F4100 allows remote authenticated users to cause a denial of service (CPU consumption) by "abnormally" terminating a connection, which prevents db2agents from being properly cleared.
Ibm Db2 Universal Database 8.1.7
Ibm Db2 Universal Database 8.1.7b
Ibm Db2 Universal Database 8.1.8
Ibm Db2 Universal Database 8.1.8a
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1.5
Ibm Db2 Universal Database 8.1.6c
Ibm Db2 Universal Database 8.1.9
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 8.1.4
Ibm Db2 Universal Database 8.1.6
Ibm Db2 Universal Database 8.1.9a
7.5
CVSSv2
CVE-2005-3643
IBM DB2 Database server running on Windows XP with Simple File Sharing enabled, allows remote malicious users to bypass authentication and log on to the guest account without supplying a password.
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.1.4
Ibm Db2 Universal Database 8.1.8a
Ibm Db2 Universal Database 8.1.9a
Ibm Db2 Universal Database 8.1.5
Ibm Db2 Universal Database 8.1.6
Ibm Db2 Universal Database 8.1.6c
Ibm Db2 Universal Database 8.1.7
Ibm Db2 Universal Database 8.1.7b
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1.8
Ibm Db2 Universal Database 8.1.9
7.2
CVSSv2
CVE-2007-1086
Unspecified binaries in IBM DB2 8.x prior to 8.1 FixPak 15 and 9.1 before Fix Pack 2 allow local users to create or modify arbitrary files via unspecified environment variables related to "unsafe file access."
Ibm Db2 Universal Database 8.1.5
Ibm Db2 Universal Database 8.1.6
Ibm Db2 Universal Database 8.1.9a
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 8.1.7b
Ibm Db2 Universal Database 8.1.8
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database 8.1.6c
Ibm Db2 Universal Database 8.1.7
Ibm Db2 Universal Database 8.10
Ibm Db2 Universal Database 8.12
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1.4
Ibm Db2 Universal Database 8.1.8a
Ibm Db2 Universal Database 8.1.9
7.2
CVSSv2
CVE-2007-1087
IBM DB2 8.x prior to 8.1 FixPak 15 and 9.1 before Fix Pack 2 does not properly terminate certain input strings, which allows local users to execute arbitrary code via unspecified environment variables that trigger a heap-based buffer overflow.
Ibm Db2 8.0
Ibm Db2 8.1.8a
Ibm Db2 8.1.9
Ibm Db2 8.1.9a
Ibm Db2 8.1
Ibm Db2 8.1.4
Ibm Db2 8.1.5
Ibm Db2 8.1.6
Ibm Db2 8.1.7
Ibm Db2 8.1.8
Ibm Db2 9.1
Ibm Db2 8.1.6c
Ibm Db2 8.1.7b
7.2
CVSSv2
CVE-2007-1088
Stack-based buffer overflow in IBM DB2 8.x prior to 8.1 FixPak 15 and 9.1 before Fix Pack 2 allows local users to execute arbitrary code via a long string in unspecified environment variables.
Ibm Db2 8.1.6c
Ibm Db2 8.1.7
Ibm Db2 8.1.7b
Ibm Db2 8.1.8
Ibm Db2 8.0
Ibm Db2 8.1
Ibm Db2 9.1
Ibm Db2 8.1.5
Ibm Db2 8.1.9
Ibm Db2 8.1.4
Ibm Db2 8.1.6
Ibm Db2 8.1.8a
Ibm Db2 8.1.9a
7.2
CVSSv2
CVE-2005-4864
Stack-based buffer overflow in libdb2.so in IBM DB2 7.x and 8.1 allows local users to execute arbitrary code via a long DB2LPORT environment variable.
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.1
7.2
CVSSv2
CVE-2003-1052
IBM DB2 7.1 and 8.1 allow the bin user to gain root privileges by modifying the shared libraries that are used in setuid root programs.
Ibm Db2 9.0
Ibm Db2 Universal Database 6.0
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 8.2
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 7.2
1 EDB exploit
6.8
CVSSv2
CVE-2005-4866
Stack-based buffer overflow in JDBC Applet Server in IBM DB2 8.1 allows remote malicious users to execute arbitrary by connecting and sending a long username, then disconnecting gracefully and reconnecting and sending a short username and an unexpected db2java.zip version, which ...
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 7.1
6.8
CVSSv2
CVE-2005-4735
IBM DB2 Universal Database (UDB) 810 prior to 8.1 FP10 allows remote authenticated users to cause a denial of service (application crash) via (1) certain equality predicates that trigger self-removal, aka IY70808; and (2) a query with more than 32000 elements in the IN-list, aka ...
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1.7
Ibm Db2 Universal Database 8.1.7b
Ibm Db2 Universal Database 8.1.8
Ibm Db2 Universal Database 8.1.8a
Ibm Db2 Universal Database 8.1.9
Ibm Db2 Universal Database 8.1.4
Ibm Db2 Universal Database 8.1.6
Ibm Db2 Universal Database 8.1.9a
Ibm Db2 Universal Database 8.1.5
Ibm Db2 Universal Database 8.1.6c
Ibm Db2 Universal Database 8.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »