Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 9.7 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2014-0907
Multiple untrusted search path vulnerabilities in unspecified (1) setuid and (2) setgid programs in IBM DB2 9.5, 9.7 before FP9a, 9.8, 10.1 before FP3a, and 10.5 before FP3a on Linux and UNIX allow local users to gain root privileges via a Trojan horse library.
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.2
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.1
Ibm Db2 9.7
Ibm Db2 10.1.0.1
Ibm Db2 10.1
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.2
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.1
Ibm Db2 10.5
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.6
Ibm Db2 9.5
7.2
CVSSv2
CVE-2013-3475
Stack-based buffer overflow in db2aud in the Audit Facility in IBM DB2 and DB2 Connect 9.1, 9.5, 9.7, 9.8, and 10.1, as used in Smart Analytics System 7600 and other products, allows local users to gain privileges via unspecified vectors.
Ibm Db2 Connect 9.1
Ibm Db2 Connect 9.5
Ibm Db2 9.1
Ibm Db2 Connect 9.7
Ibm Db2 Connect 9.8
Ibm Db2 9.5
Ibm Db2 9.7
Ibm Db2 Connect 10.1
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Smart Analytics System 7600 -
7.2
CVSSv2
CVE-2009-4331
The Install component in IBM DB2 9.5 before FP5 and 9.7 before FP1 configures the High Availability (HA) scripts with incorrect file-permission and authorization settings, which has unknown impact and local attack vectors.
Ibm Db2 9.5
Ibm Db2 9.7
7.1
CVSSv2
CVE-2012-2197
Stack-based buffer overflow in the Java Stored Procedure infrastructure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote authenticated users to execute arbitrary code by leveraging certain CONNECT and EXECUTE privileges.
Ibm Db2 9.1
Ibm Db2 9.1.0.1
Ibm Db2 9.1.0.5
Ibm Db2 9.1.0.6
Ibm Db2 9.1.0.11
Ibm Db2 9.1.0.2
Ibm Db2 9.1.0.7
Ibm Db2 9.1.0.3
Ibm Db2 9.1.0.8
Ibm Db2 9.1.0.4
Ibm Db2 9.1.0.9
Ibm Db2 9.1.0.10
Ibm Db2 9.5.0.4
Ibm Db2 9.5
Ibm Db2 9.5.0.1
Ibm Db2 9.5.0.2
Ibm Db2 9.5.0.5
Ibm Db2 9.5.0.6
Ibm Db2 9.5.0.3
Ibm Db2 9.5.0.7
Ibm Db2 9.5.0.8
Ibm Db2 9.5.0.9
6.9
CVSSv2
CVE-2020-4739
IBM DB2 Accessories Suite for Linux, UNIX, and Windows, DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local authenticated malicious user to execute arbitrary code on the system, caused by DLL search order hijacking vul...
Ibm Db2 9.7.0.0
Ibm Db2 10.1.0.0
Ibm Db2 10.5.0.0
Ibm Db2 11.1.0.0
Ibm Db2
1 Article
6.9
CVSSv2
CVE-2016-5995
Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program.
Ibm Db2 11.1.0.0
Ibm Db2 Connect 11.1.0.0
Ibm Db2 Connect 10.1.0.5
Ibm Db2 Connect 10.1.0.4
Ibm Db2 Connect 10.1.0.2
Ibm Db2 Connect 10.1.0.1
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.1
Ibm Db2 10.1.0.5
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1
Ibm Db2 Connect 10.5.0.4
Ibm Db2 Connect 10.5.0.3
Ibm Db2 Connect 10.5.0.2
Ibm Db2 Connect 10.5.0.1
Ibm Db2 Connect 10.5
Ibm Db2 10.5.0.3
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.7
Ibm Db2 10.5.0.6
6.9
CVSSv2
CVE-2011-4061
Multiple untrusted search path vulnerabilities in (1) db2rspgn and (2) kbbacf1 in IBM DB2 Express Edition 9.7, as used in the IBM Tivoli Monitoring for Databases: DB2 Agent, allow local users to gain privileges via a Trojan horse libkbb.so in the current working directory, relate...
Ibm Db2 9.7
Ibm Tivoli Monitoring For Databases
6.8
CVSSv2
CVE-2018-1458
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10,1, 10.5 and 11.1 could allow a local user to execute arbitrary code and conduct DLL hijacking attacks. IBM X-Force ID: 140209.
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 11.1
Ibm Db2 9.7
6.8
CVSSv2
CVE-2015-0157
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) by leveraging an unspecified scalar function in a SQL statement.
Ibm Db2 9.7
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 10.5
6.5
CVSSv2
CVE-2011-1846
IBM DB2 9.5 before FP7 and 9.7 before FP4 on Linux, UNIX, and Windows does not properly revoke role membership from groups, which allows remote authenticated users to execute non-DDL statements by leveraging previous inherited possession of a role, a different vulnerability than ...
Ibm Db2 9.5
Ibm Db2
Ibm Db2 9.7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »