Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 9.5 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2014-0907
Multiple untrusted search path vulnerabilities in unspecified (1) setuid and (2) setgid programs in IBM DB2 9.5, 9.7 before FP9a, 9.8, 10.1 before FP3a, and 10.5 before FP3a on Linux and UNIX allow local users to gain root privileges via a Trojan horse library.
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.2
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.1
Ibm Db2 9.7
Ibm Db2 10.1.0.1
Ibm Db2 10.1
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.2
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.1
Ibm Db2 10.5
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.6
Ibm Db2 9.5
7.2
CVSSv2
CVE-2013-3475
Stack-based buffer overflow in db2aud in the Audit Facility in IBM DB2 and DB2 Connect 9.1, 9.5, 9.7, 9.8, and 10.1, as used in Smart Analytics System 7600 and other products, allows local users to gain privileges via unspecified vectors.
Ibm Db2 Connect 9.1
Ibm Db2 Connect 9.5
Ibm Db2 9.1
Ibm Db2 Connect 9.7
Ibm Db2 Connect 9.8
Ibm Db2 9.5
Ibm Db2 9.7
Ibm Db2 Connect 10.1
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Smart Analytics System 7600 -
7.2
CVSSv2
CVE-2012-1796
Unspecified vulnerability in IBM Tivoli Monitoring Agent (ITMA), as used in IBM DB2 9.5 before FP9 on UNIX, allows local users to gain privileges via unknown vectors.
Ibm Db2 9.5
7.2
CVSSv2
CVE-2010-3733
The Engine Utilities component in IBM DB2 UDB 9.5 before FP6a uses world-writable permissions for the sqllib/cfg/db2sprf file, which might allow local users to gain privileges by modifying this file.
Ibm Db2 9.5
7.2
CVSSv2
CVE-2009-4330
Unspecified vulnerability in db2licm in the Engine Utilities component in IBM DB2 9.5 before FP5 has unknown impact and local attack vectors.
Ibm Db2 9.5
7.2
CVSSv2
CVE-2009-4331
The Install component in IBM DB2 9.5 before FP5 and 9.7 before FP1 configures the High Availability (HA) scripts with incorrect file-permission and authorization settings, which has unknown impact and local attack vectors.
Ibm Db2 9.5
Ibm Db2 9.7
7.1
CVSSv2
CVE-2012-2197
Stack-based buffer overflow in the Java Stored Procedure infrastructure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote authenticated users to execute arbitrary code by leveraging certain CONNECT and EXECUTE privileges.
Ibm Db2 9.1
Ibm Db2 9.1.0.1
Ibm Db2 9.1.0.5
Ibm Db2 9.1.0.6
Ibm Db2 9.1.0.11
Ibm Db2 9.1.0.2
Ibm Db2 9.1.0.7
Ibm Db2 9.1.0.3
Ibm Db2 9.1.0.8
Ibm Db2 9.1.0.4
Ibm Db2 9.1.0.9
Ibm Db2 9.1.0.10
Ibm Db2 9.5.0.4
Ibm Db2 9.5
Ibm Db2 9.5.0.1
Ibm Db2 9.5.0.2
Ibm Db2 9.5.0.5
Ibm Db2 9.5.0.6
Ibm Db2 9.5.0.3
Ibm Db2 9.5.0.7
Ibm Db2 9.5.0.8
Ibm Db2 9.5.0.9
6.9
CVSSv2
CVE-2007-5664
db2dasrrm in the DB2 Administration Server (DAS) in IBM DB2 Universal Database 9.5 before Fix Pack 1, 9.1 before Fix Pack 4a, and 8 before FixPak 16 allows local users to overwrite arbitrary files via a symlink attack on files used for initialization.
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database 9.5
Ibm Db2 Universal Database 8
6.9
CVSSv2
CVE-2007-5758
Stack-based buffer overflow in db2dasrrm in the DB2 Administration Server (DAS) in IBM DB2 Universal Database 9.5 before Fix Pack 1, 9.1 before Fix Pack 4a, and 8 before FixPak 16 allows local users to execute arbitrary code via a long DASPROF environment variable.
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database 9.5
Ibm Db2 Universal Database 8
6.5
CVSSv2
CVE-2011-1846
IBM DB2 9.5 before FP7 and 9.7 before FP4 on Linux, UNIX, and Windows does not properly revoke role membership from groups, which allows remote authenticated users to execute non-DDL statements by leveraging previous inherited possession of a role, a different vulnerability than ...
Ibm Db2 9.5
Ibm Db2
Ibm Db2 9.7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »