Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 8.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-3958
IBM DB2 UDB 8 before Fixpak 17 allows remote malicious users to cause a denial of service (instance crash) via a crafted CONNECT/ATTACH data stream that simulates a V7 client connect/attach request. NOTE: this may overlap CVE-2008-3858. NOTE: this issue exists because of an incom...
Ibm Db2 8.0
Ibm Db2
NA
CVE-2007-1087
IBM DB2 8.x prior to 8.1 FixPak 15 and 9.1 before Fix Pack 2 does not properly terminate certain input strings, which allows local users to execute arbitrary code via unspecified environment variables that trigger a heap-based buffer overflow.
Ibm Db2 8.0
Ibm Db2 8.1.8a
Ibm Db2 8.1.9
Ibm Db2 8.1.9a
Ibm Db2 8.1
Ibm Db2 8.1.4
Ibm Db2 8.1.5
Ibm Db2 8.1.6
Ibm Db2 8.1.7
Ibm Db2 8.1.8
Ibm Db2 9.1
Ibm Db2 8.1.6c
Ibm Db2 8.1.7b
NA
CVE-2007-1088
Stack-based buffer overflow in IBM DB2 8.x prior to 8.1 FixPak 15 and 9.1 before Fix Pack 2 allows local users to execute arbitrary code via a long string in unspecified environment variables.
Ibm Db2 8.1.6c
Ibm Db2 8.1.7
Ibm Db2 8.1.7b
Ibm Db2 8.1.8
Ibm Db2 8.0
Ibm Db2 8.1
Ibm Db2 9.1
Ibm Db2 8.1.5
Ibm Db2 8.1.9
Ibm Db2 8.1.4
Ibm Db2 8.1.6
Ibm Db2 8.1.8a
Ibm Db2 8.1.9a
NA
CVE-2006-4257
IBM DB2 Universal Database (UDB) prior to 8.1 FixPak 13 allows remote authenticated users to cause a denial of service (crash) by (1) sending the first ACCSEC command without an RDBNAM parameter during the CONNECT process, or (2) sending crafted SQLJRA packet, which results in a ...
Ibm Db2 8.1.4
Ibm Db2 8.1.6
Ibm Db2 8.1.7
Ibm Db2 8.1.7b
Ibm Db2 8.1.8a
Ibm Db2 8.1.9a
Ibm Db2 8.1
Ibm Db2 8.0
Ibm Db2 8.1.5
Ibm Db2 8.1.6c
Ibm Db2 8.1.8
Ibm Db2 8.1.9
Ibm Db2 8.12
Ibm Db2 8.2
Ibm Db2 8.10
NA
CVE-2006-3067
Multiple unspecified vulnerabilities in IBM DB2 Universal Database (UDB) prior to 8.1 FixPak 12 allow remote malicious users to cause a denial of service (application crash) via a (1) "long column list" in the (a) REPLACE INTO and (b) INSERT INTO portions of the LOAD co...
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database
NA
CVE-2008-3856
The routine infrastructure component in IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP1 on Unix and Linux does not change the ownership of the db2fmp process, which has unknown impact and attack vectors.
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database
Ibm Db2 Universal Database 8
NA
CVE-2007-4423
Stack-based buffer overflow in the AUTH_LIST_GROUPS_FOR_AUTHID function in IBM DB2 UDB 9.1 before Fixpak 3 allows malicious users to cause a denial of service and possibly execute arbitrary code via a long argument.
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 9.0
Ibm Db2 Universal Database 9.1
NA
CVE-2005-4864
Stack-based buffer overflow in libdb2.so in IBM DB2 7.x and 8.1 allows local users to execute arbitrary code via a long DB2LPORT environment variable.
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.1
NA
CVE-2005-4865
Stack-based buffer overflow in call in IBM DB2 7.x and 8.1 allows remote malicious users to execute arbitrary code via a long libname.
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.1
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 8.0
NA
CVE-2005-4867
Stack-based buffer overflow in the SATENCRYPT function in IBM DB2 8.1, when Satellite Administration (SATADMIN) is enabled, allows remote malicious users to execute arbitrary code via a long parameter.
Ibm Db2 Universal Database 7.0
Ibm Db2 Universal Database 7.2
Ibm Db2 Universal Database 8.0
Ibm Db2 Universal Database 8.1
Ibm Db2 Universal Database 7.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »