Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 9.5 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2009-4326
The RAND scalar function in the Common Code Infrastructure component in IBM DB2 9.5 before FP5 and 9.7 before FP1, when the Database Partitioning Feature (DPF) is used, produces "repeating" return values, which might allow malicious users to defeat protection mechanisms...
Ibm Db2 9.5
Ibm Db2 9.7
5
CVSSv2
CVE-2009-4327
The Common Code Infrastructure component in IBM DB2 9.5 before FP5 and 9.7 before FP1 does not properly validate the size of a memory pool during a creation attempt, which allows malicious users to cause a denial of service (memory consumption) via unspecified vectors.
Ibm Db2 9.5
Ibm Db2 9.7
7.2
CVSSv2
CVE-2009-4331
The Install component in IBM DB2 9.5 before FP5 and 9.7 before FP1 configures the High Availability (HA) scripts with incorrect file-permission and authorization settings, which has unknown impact and local attack vectors.
Ibm Db2 9.5
Ibm Db2 9.7
7.2
CVSSv2
CVE-2013-3475
Stack-based buffer overflow in db2aud in the Audit Facility in IBM DB2 and DB2 Connect 9.1, 9.5, 9.7, 9.8, and 10.1, as used in Smart Analytics System 7600 and other products, allows local users to gain privileges via unspecified vectors.
Ibm Db2 Connect 9.1
Ibm Db2 Connect 9.5
Ibm Db2 9.1
Ibm Db2 Connect 9.7
Ibm Db2 Connect 9.8
Ibm Db2 9.5
Ibm Db2 9.7
Ibm Db2 Connect 10.1
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Smart Analytics System 7600 -
4
CVSSv2
CVE-2014-8901
IBM DB2 9.5 through FP10, 9.7 through FP10, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP5 allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted XML query.
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 9.5
Ibm Db2 9.7
4
CVSSv2
CVE-2014-0919
IBM DB2 9.5 up to and including 10.5 on Linux, UNIX, and Windows stores passwords during the processing of certain SQL statements by the monitoring and audit facilities, which allows remote authenticated users to obtain sensitive information via commands associated with these fac...
Ibm Db2 9.7
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 9.5
4.6
CVSSv2
CVE-2009-4150
dasauto in IBM DB2 8 before FP18, 9.1 before FP8, 9.5 before FP4, and 9.7 before FP1 permits execution by unprivileged user accounts, which has unspecified impact and local attack vectors.
Ibm Db2 Universal Database 8
Ibm Db2 9.1
Ibm Db2 9.5
Ibm Db2 9.7
6.4
CVSSv2
CVE-2010-3739
The audit facility in the Security component in IBM DB2 UDB 9.5 before FP6a uses instance-level audit settings to capture connection (aka CONNECT and AUTHENTICATION) events in certain circumstances in which database-level audit settings were intended, which might make it easier f...
Ibm Db2 Universal Database 9.5
Ibm Db2 Universal Database
4
CVSSv2
CVE-2010-3740
The Net Search Extender (NSE) implementation in the Text Search component in IBM DB2 UDB 9.5 before FP6a does not properly handle an alphanumeric Fuzzy search, which allows remote authenticated users to cause a denial of service (memory consumption and system hang) via the db2ext...
Ibm Db2 9.5
4
CVSSv2
CVE-2009-4328
Unspecified vulnerability in the DRDA Services component in IBM DB2 9.5 before FP5 allows remote authenticated users to cause a denial of service (server trap) by calling a SQL stored procedure in unknown circumstances.
Ibm Db2 9.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »