Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 9.1 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2007-1088
Stack-based buffer overflow in IBM DB2 8.x prior to 8.1 FixPak 15 and 9.1 before Fix Pack 2 allows local users to execute arbitrary code via a long string in unspecified environment variables.
Ibm Db2 8.1.6c
Ibm Db2 8.1.7
Ibm Db2 8.1.7b
Ibm Db2 8.1.8
Ibm Db2 8.0
Ibm Db2 8.1
Ibm Db2 9.1
Ibm Db2 8.1.5
Ibm Db2 8.1.9
Ibm Db2 8.1.4
Ibm Db2 8.1.6
Ibm Db2 8.1.8a
Ibm Db2 8.1.9a
641
VMScore
CVE-2007-1089
IBM DB2 Universal Database (UDB) 9.1 GA up to and including 9.1 FP1 allows local users with table SELECT privileges to perform unauthorized UPDATE and DELETE SQL commands via unknown vectors.
Ibm Db2 Universal Database
Ibm Db2 Universal Database 9.1
641
VMScore
CVE-2007-1087
IBM DB2 8.x prior to 8.1 FixPak 15 and 9.1 before Fix Pack 2 does not properly terminate certain input strings, which allows local users to execute arbitrary code via unspecified environment variables that trigger a heap-based buffer overflow.
Ibm Db2 8.0
Ibm Db2 8.1.8a
Ibm Db2 8.1.9
Ibm Db2 8.1.9a
Ibm Db2 8.1
Ibm Db2 8.1.4
Ibm Db2 8.1.5
Ibm Db2 8.1.6
Ibm Db2 8.1.7
Ibm Db2 8.1.8
Ibm Db2 9.1
Ibm Db2 8.1.6c
Ibm Db2 8.1.7b
632
VMScore
CVE-2012-2197
Stack-based buffer overflow in the Java Stored Procedure infrastructure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote authenticated users to execute arbitrary code by leveraging certain CONNECT and EXECUTE privileges.
Ibm Db2 9.1
Ibm Db2 9.1.0.1
Ibm Db2 9.1.0.5
Ibm Db2 9.1.0.6
Ibm Db2 9.1.0.11
Ibm Db2 9.1.0.2
Ibm Db2 9.1.0.7
Ibm Db2 9.1.0.3
Ibm Db2 9.1.0.8
Ibm Db2 9.1.0.4
Ibm Db2 9.1.0.9
Ibm Db2 9.1.0.10
Ibm Db2 9.5.0.4
Ibm Db2 9.5
Ibm Db2 9.5.0.1
Ibm Db2 9.5.0.2
Ibm Db2 9.5.0.5
Ibm Db2 9.5.0.6
Ibm Db2 9.5.0.3
Ibm Db2 9.5.0.7
Ibm Db2 9.5.0.8
Ibm Db2 9.5.0.9
614
VMScore
CVE-2007-5664
db2dasrrm in the DB2 Administration Server (DAS) in IBM DB2 Universal Database 9.5 before Fix Pack 1, 9.1 before Fix Pack 4a, and 8 before FixPak 16 allows local users to overwrite arbitrary files via a symlink attack on files used for initialization.
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database 9.5
Ibm Db2 Universal Database 8
614
VMScore
CVE-2007-5758
Stack-based buffer overflow in db2dasrrm in the DB2 Administration Server (DAS) in IBM DB2 Universal Database 9.5 before Fix Pack 1, 9.1 before Fix Pack 4a, and 8 before FixPak 16 allows local users to execute arbitrary code via a long DASPROF environment variable.
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database 9.5
Ibm Db2 Universal Database 8
614
VMScore
CVE-2007-4275
Multiple untrusted search path vulnerabilities in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allow local users to gain privileges via certain vectors related to (1) DB2 instance or FMP startup on Linux and Solaris; (2) exec of executables while running as root on non-...
Ibm Db2 Universal Database
614
VMScore
CVE-2007-4270
Multiple race conditions in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allow local users to gain root privileges via a symlink attack on certain files.
Ibm Db2 Universal Database
614
VMScore
CVE-2007-4276
Stack-based buffer overflow in IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 allows malicious users to execute arbitrary code via a long DASPROF and possibly other environment variables, which are copied into the buildDasPaths buffer.
Ibm Db2 Universal Database
578
VMScore
CVE-2011-0757
IBM DB2 9.1 before FP10, 9.5 before FP6a, and 9.7 before FP2 on Linux, UNIX, and Windows does not properly revoke the DBADM authority, which allows remote authenticated users to execute non-DDL statements by leveraging previous possession of this authority.
Ibm Db2 9.1
Ibm Db2
Ibm Db2 9.5
Ibm Db2 9.7
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »