Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 9.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-6820
The db2fmp process in IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP2 on Windows runs with "OS privilege," which has unknown impact and attack vectors, a different vulnerability than CVE-2008-3856.
Ibm Db2 8.0
Ibm Db2 9.1
Ibm Db2 9.5
NA
CVE-2009-4332
db2pd in the Problem Determination component in IBM DB2 9.1 before FP7 and 9.5 before FP5 allows malicious users to cause a denial of service (NULL pointer dereference and application termination) via unspecified vectors.
Ibm Db2 9.5
Ibm Db2 9.1
Ibm Db2 9.7
NA
CVE-2008-2154
IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP2 provides an INSTALL_JAR (aka sqlj.install_jar) procedure, which allows remote authenticated users to create or overwrite arbitrary files via unspecified calls.
Ibm Db2 8.0
Ibm Db2 9.1
Ibm Db2 9.5
NA
CVE-2009-3471
IBM DB2 8 before FP18, 9.1 before FP8, 9.5 before FP4, and 9.7 before FP2 does not perform the expected drops of certain table functions upon a loss of privileges by the functions' definers, which has unspecified impact and remote attack vectors.
Ibm Db2 8.0
Ibm Db2 9.1
Ibm Db2 9.5
NA
CVE-2009-3472
IBM DB2 8 before FP18, 9.1 before FP8, and 9.5 before FP4 allows remote authenticated users to bypass intended access restrictions, and update, insert, or delete table rows, via unspecified vectors.
Ibm Db2 8.0
Ibm Db2 9.1
Ibm Db2 9.5
NA
CVE-2012-0710
IBM DB2 9.1 before FP11, 9.5 before FP9, 9.7 before FP5, and 9.8 before FP4 allows remote malicious users to cause a denial of service (daemon crash) via a crafted Distributed Relational Database Architecture (DRDA) request.
Ibm Db2 9.5
Ibm Db2 9.7
Ibm Db2 9.1
Ibm Db2 9.8
NA
CVE-2014-6209
IBM DB2 9.5 through FP10, 9.7 through FP10, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP5 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) by specifying an identity column within a crafted ALTER TABLE statement.
Ibm Db2 9.7
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 9.5
NA
CVE-2009-4325
The Client Interfaces component in IBM DB2 8.2 before FP18, 9.1 before FP8, 9.5 before FP5, and 9.7 before FP1 does not validate an unspecified pointer, which allows malicious users to overwrite "external memory" via unknown vectors, related to a missing "check for...
Ibm Db2 8.2
Ibm Db2 9.1
Ibm Db2 9.5
Ibm Db2 9.7
NA
CVE-2013-5466
The XSLT library in IBM DB2 and DB2 Connect 9.5 up to and including 10.5, and the DB2 pureScale Feature 9.8 for Enterprise Server Edition, allows remote authenticated users to cause a denial of service via unspecified vectors.
Ibm Db2 Connect 10.1
Ibm Db2 Connect 10.5
Ibm Db2 9.5
Ibm Db2 Connect 9.7
Ibm Db2 Connect 9.8
Ibm Db2 Connect 9.5
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 Purescale Feature 9.8 -
Ibm Db2 9.8
Ibm Db2 9.7
NA
CVE-2009-4326
The RAND scalar function in the Common Code Infrastructure component in IBM DB2 9.5 before FP5 and 9.7 before FP1, when the Database Partitioning Feature (DPF) is used, produces "repeating" return values, which might allow malicious users to defeat protection mechanisms...
Ibm Db2 9.5
Ibm Db2 9.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »