Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2012-2180
The chaining functionality in the Distributed Relational Database Architecture (DRDA) module in IBM DB2 9.7 before FP6 and 9.8 before FP5 allows remote malicious users to cause a denial of service (NULL pointer dereference, and resource consumption or daemon crash) via a crafted ...
Ibm Db2 9.7.0.5
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.8
Ibm Db2 9.8.0.3
Ibm Db2 9.8.0.4
4
CVSSv2
CVE-2013-5466
The XSLT library in IBM DB2 and DB2 Connect 9.5 up to and including 10.5, and the DB2 pureScale Feature 9.8 for Enterprise Server Edition, allows remote authenticated users to cause a denial of service via unspecified vectors.
Ibm Db2 Connect 10.1
Ibm Db2 Connect 10.5
Ibm Db2 9.5
Ibm Db2 Connect 9.7
Ibm Db2 Connect 9.8
Ibm Db2 Connect 9.5
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 Purescale Feature 9.8 -
Ibm Db2 9.8
Ibm Db2 9.7
3.5
CVSSv2
CVE-2012-0713
Unspecified vulnerability in the XML feature in IBM DB2 9.7 before FP6 on Linux, UNIX, and Windows allows remote authenticated users to read arbitrary XML files via unknown vectors.
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.5
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
4.6
CVSSv2
CVE-2013-4033
IBM DB2 and DB2 Connect 9.7 through FP8, 9.8 through FP5, 10.1 through FP2, and 10.5 through FP1 allow remote authenticated users to execute DML statements by leveraging EXPLAIN authority.
Ibm Db2 10.5
Ibm Db2 10.1
Ibm Db2 Connect 10.1
Ibm Db2 Connect 9.5
Ibm Db2 9.8
Ibm Db2 9.7
Ibm Db2 Connect 10.5
Ibm Db2 Connect 9.7
Ibm Db2 Connect 9.8
6.9
CVSSv2
CVE-2020-4739
IBM DB2 Accessories Suite for Linux, UNIX, and Windows, DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local authenticated malicious user to execute arbitrary code on the system, caused by DLL search order hijacking vul...
Ibm Db2 9.7.0.0
Ibm Db2 10.1.0.0
Ibm Db2 10.5.0.0
Ibm Db2 11.1.0.0
Ibm Db2
1 Article
7.2
CVSSv2
CVE-2013-3475
Stack-based buffer overflow in db2aud in the Audit Facility in IBM DB2 and DB2 Connect 9.1, 9.5, 9.7, 9.8, and 10.1, as used in Smart Analytics System 7600 and other products, allows local users to gain privileges via unspecified vectors.
Ibm Db2 Connect 9.1
Ibm Db2 Connect 9.5
Ibm Db2 9.1
Ibm Db2 Connect 9.7
Ibm Db2 Connect 9.8
Ibm Db2 9.5
Ibm Db2 9.7
Ibm Db2 Connect 10.1
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Smart Analytics System 7600 -
4.3
CVSSv2
CVE-2017-1520
IBM DB2 9.7, 10,1, 10.5, and 11.1 is vulnerable to an unauthorized command that allows the database to be activated when authentication type is CLIENT. IBM X-Force ID: 129830.
Ibm Db2 10.1
Ibm Db2 10.1.0.2
Ibm Db2 Connect 10.1.0.3
Ibm Db2 Connect 10.1.0.5
Ibm Db2 Connect 10.5.0.4
Ibm Db2 Connect 10.5.0.6
Ibm Db2 10.5.0.4
Ibm Db2 10.5.0.6
Ibm Db2 Connect 9.7.0.5
Ibm Db2 Connect 9.7.0.7
Ibm Db2 9.7
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.10
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1.0.5
Ibm Db2 Connect 10.1
Ibm Db2 Connect 10.1.0.1
Ibm Db2 10.5
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.2
7.2
CVSSv2
CVE-2017-1451
IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128178.
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.4
Ibm Db2 Connect 10.1.0.5
Ibm Db2 Connect 10.5.0.1
Ibm Db2 Connect 10.5.0.6
Ibm Db2 10.5
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.6
Ibm Db2 Connect 9.7
Ibm Db2 Connect 9.7.0.7
Ibm Db2 Connect 9.7.0.9
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.10
Ibm Db2 11.1.0.0
Ibm Db2 Connect 11.1.0.0
Ibm Db2 10.1
Ibm Db2 10.1.0.1
Ibm Db2 Connect 10.5.0.2
Ibm Db2 Connect 10.5.0.3
Ibm Db2 Connect 10.5.0.4
Ibm Db2 Connect 10.5.0.5
7.2
CVSSv2
CVE-2017-1452
IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user to obtain elevated privilege and overwrite DB2 files. IBM X-Force ID: 128180.
Ibm Db2 Connect 10.1.0.2
Ibm Db2 Connect 10.1.0.3
Ibm Db2 Connect 10.1.0.4
Ibm Db2 Connect 10.1.0.5
Ibm Db2 Connect 10.5
Ibm Db2 10.5.0.4
Ibm Db2 10.5.0.5
Ibm Db2 Connect 11.1.0.0
Ibm Db2 10.1.0.4
Ibm Db2 Connect 10.1
Ibm Db2 Connect 10.5.0.1
Ibm Db2 Connect 10.5.0.3
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.3
Ibm Db2 Connect 9.7
Ibm Db2 Connect 9.7.0.2
Ibm Db2 Connect 9.7.0.9
Ibm Db2 Connect 9.7.0.11
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.8
Ibm Db2 10.5.0.6
Ibm Db2 10.5.0.7
6.9
CVSSv2
CVE-2016-5995
Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program.
Ibm Db2 11.1.0.0
Ibm Db2 Connect 11.1.0.0
Ibm Db2 Connect 10.1.0.5
Ibm Db2 Connect 10.1.0.4
Ibm Db2 Connect 10.1.0.2
Ibm Db2 Connect 10.1.0.1
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.1
Ibm Db2 10.1.0.5
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1
Ibm Db2 Connect 10.5.0.4
Ibm Db2 Connect 10.5.0.3
Ibm Db2 Connect 10.5.0.2
Ibm Db2 Connect 10.5.0.1
Ibm Db2 Connect 10.5
Ibm Db2 10.5.0.3
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.7
Ibm Db2 10.5.0.6
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »