Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
db2 universal database vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-1052
IBM DB2 7.1 and 8.1 allow the bin user to gain root privileges by modifying the shared libraries that are used in setuid root programs.
Ibm Db2 Universal Database 8.1
Ibm Db2 9.0
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 6.0
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.2
1 EDB exploit
NA
CVE-2002-1583
Buffer overflow in sqllib/security/db2ckpw for IBM DB2 Universal Database 6.0 and 7.0 allows local users to execute arbitrary code via a long username that is read from a file descriptor argument.
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 6.0
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.2
NA
CVE-2005-4866
Stack-based buffer overflow in JDBC Applet Server in IBM DB2 8.1 allows remote malicious users to execute arbitrary by connecting and sending a long username, then disconnecting gracefully and reconnecting and sending a short username and an unexpected db2java.zip version, which ...
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
NA
CVE-2005-4864
Stack-based buffer overflow in libdb2.so in IBM DB2 7.x and 8.1 allows local users to execute arbitrary code via a long DB2LPORT environment variable.
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
NA
CVE-2005-4865
Stack-based buffer overflow in call in IBM DB2 7.x and 8.1 allows remote malicious users to execute arbitrary code via a long libname.
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
NA
CVE-2005-4867
Stack-based buffer overflow in the SATENCRYPT function in IBM DB2 8.1, when Satellite Administration (SATADMIN) is enabled, allows remote malicious users to execute arbitrary code via a long parameter.
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
NA
CVE-2008-3856
The routine infrastructure component in IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP1 on Unix and Linux does not change the ownership of the db2fmp process, which has unknown impact and attack vectors.
Ibm Db2 Universal Database 8
Ibm Db2 Universal Database
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database 8.0
NA
CVE-2004-1372
Multiple stack-based buffer overflows in IBM DB2 7.x and 8.1 allow local users to execute arbitrary code via (1) a long third argument to the rec2xml function or (2) a long filename argument to the generate_distfile procedure.
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
NA
CVE-2005-4863
Stack-based buffer overflow in db2fmp in IBM DB2 7.x and 8.1 allows local users to execute arbitrary code via a long parameter.
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
7.1
CVSSv3
CVE-2005-4868
Shared memory sections and events in IBM DB2 8.1 have default permissions of read and write for the Everyone group, which allows local users to gain unauthorized access, gain sensitive information, such as cleartext passwords, and cause a denial of service.
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »