Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
db2 vulnerabilities and exploits
(subscribe to this query)
8.5
CVSSv2
CVE-2012-4826
Stack-based buffer overflow in the SQL/PSM (aka SQL Persistent Stored Module) Stored Procedure (SP) infrastructure in IBM DB2 9.1, 9.5, 9.7 before FP7, 9.8, and 10.1 might allow remote authenticated users to execute arbitrary code by debugging a stored procedure.
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.3
Ibm Db2 9.1
Ibm Db2 9.5
Ibm Db2 9.7
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.1
8.5
CVSSv2
CVE-2008-1998
The NNSTAT (aka SYSPROC.NNSTAT) procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 on Windows allows remote authenticated users to overwrite arbitrary files via the log file parameter.
Ibm Db2 8.0
Ibm Db2 9.5
Ibm Db2 9.1
8
CVSSv2
CVE-2015-1935
The scalar-function implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote malicious users to cause a denial of service or execute arbitrary code via unspecified vectors.
Ibm Db2 9.7
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 9.8
7.8
CVSSv2
CVE-2014-6154
Directory traversal vulnerability in IBM Optim Performance Manager for DB2 4.1.0.1 up to and including 4.1.1 on Linux, UNIX, and Windows and IBM InfoSphere Optim Performance Manager for DB2 5.1 up to and including 5.3.1 on Linux, UNIX, and Windows allows remote malicious users to...
Ibm Optim Performance Manager 4.1.1
Ibm Optim Performance Manager 4.1.1.1
Ibm Optim Performance Manager 5.1.0
7.8
CVSSv2
CVE-2011-1528
The krb5_ldap_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 up to and including 1.8.4 and 1.9 up to and including 1.9.1, when the LDAP back end is used, allows remote malicious users to cause a denial of service (assertion failure an...
Mit Kerberos 5 1.8.4
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8
Mit Kerberos 5 1.9.1
Mit Kerberos 5 1.9
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.8.1
7.8
CVSSv2
CVE-2011-1529
The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 up to and including 1.8.4 and 1.9 up to and including 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote malicious users to cause a denial of servic...
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.9
Mit Kerberos 5 1.8.4
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.8
Mit Kerberos 5 1.9.1
7.8
CVSSv2
CVE-2011-1527
The kdb_ldap plugin in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 up to and including 1.9.1, when the LDAP back end is used, allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via a kinit operation with i...
Mit Kerberos 5 1.9.1
Mit Kerberos 5 1.9
7.8
CVSSv2
CVE-2011-4151
The krb5_db2_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 up to and including 1.8.4, when the db2 (aka Berkeley DB) back end is used, allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via...
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.8
Mit Kerberos 5 1.8.4
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.8.2
7.8
CVSSv2
CVE-2010-1124
bos.rte.libc 5.3.9.4 on IBM AIX 5.3 does not properly support reading a certain address field after a successful getaddrinfo function call, which allows context-dependent malicious users to cause a denial of service (application crash) via unspecified vectors, as demonstrated by ...
Ibm Aix 5.3.0
Ibm Aix 5.3
7.8
CVSSv2
CVE-2008-3854
Multiple stack-based buffer overflows in IBM DB2 9.1 before Fixpak 5 and 9.5 before Fixpak 1 allow remote malicious users to cause a denial of service (system outage) via vectors related to (1) use of XQuery to issue statements; the (2) XMLQUERY, (3) XMLEXISTS, and (4) XMLTABLE s...
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database 9.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »