Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 9.1 vulnerabilities and exploits
(subscribe to this query)
578
VMScore
CVE-2009-4438
The Query Compiler, Rewrite, and Optimizer component in IBM DB2 9.1 before FP8, 9.5 before FP5, and 9.7 before FP1 does not enforce privilege requirements for access to a (1) sequence or (2) global-variable object, which allows remote authenticated users to make use of data via u...
Ibm Db2 9.1
Ibm Db2 9.5
Ibm Db2 9.7
578
VMScore
CVE-2009-3472
IBM DB2 8 before FP18, 9.1 before FP8, and 9.5 before FP4 allows remote authenticated users to bypass intended access restrictions, and update, insert, or delete table rows, via unspecified vectors.
Ibm Db2 8.0
Ibm Db2 9.1
Ibm Db2 9.5
578
VMScore
CVE-2008-3852
Unspecified vulnerability in the CLR stored procedure deployment from IBM Database Add-Ins for Visual Studio in the Visual Studio Net component in IBM DB2 9.1 before Fixpak 5 and 9.5 before Fixpak 2 allows remote authenticated users to execute arbitrary code via unknown vectors.
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database
Ibm Db2 Universal Database 9.5
570
VMScore
CVE-2009-4325
The Client Interfaces component in IBM DB2 8.2 before FP18, 9.1 before FP8, 9.5 before FP5, and 9.7 before FP1 does not validate an unspecified pointer, which allows malicious users to overwrite "external memory" via unknown vectors, related to a missing "check for...
Ibm Db2 8.2
Ibm Db2 9.1
Ibm Db2 9.5
Ibm Db2 9.7
534
VMScore
CVE-2008-2154
IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP2 provides an INSTALL_JAR (aka sqlj.install_jar) procedure, which allows remote authenticated users to create or overwrite arbitrary files via unspecified calls.
Ibm Db2 8.0
Ibm Db2 9.1
Ibm Db2 9.5
534
VMScore
CVE-2007-4417
IBM DB2 UDB 8 before Fixpak 15 and 9.1 before Fixpak 3 does not properly revoke privileges on methods, which allows remote authenticated users to execute a method after revocation until the routine auth cache is flushed.
Ibm Db2 Universal Database
505
VMScore
CVE-2009-0172
Unspecified vulnerability in IBM DB2 8 before FP17a, 9.1 before FP6a, and 9.5 before FP3a allows remote malicious users to cause a denial of service (infinite loop) via a crafted CONNECT data stream.
Ibm Db2 Universal Database 9.1
Ibm Db2 Universal Database 9.5
1 EDB exploit
445
VMScore
CVE-2012-2194
Directory traversal vulnerability in the SQLJ.DB2_INSTALL_JAR stored procedure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote malicious users to replace JAR files via unspecified vectors.
Ibm Db2 9.1.0.2
Ibm Db2 9.1.0.3
Ibm Db2 9.1.0.7
Ibm Db2 9.1.0.8
Ibm Db2 9.1.0.4
Ibm Db2 9.1.0.9
Ibm Db2 9.1.0.10
Ibm Db2 9.1.0.1
Ibm Db2 9.1.0.6
Ibm Db2 9.1
Ibm Db2 9.1.0.5
Ibm Db2 9.1.0.11
Ibm Db2 9.5.0.2
Ibm Db2 9.5.0.6
Ibm Db2 9.5.0.7
Ibm Db2 9.5.0.3
Ibm Db2 9.5.0.8
Ibm Db2 9.5.0.9
Ibm Db2 9.5
Ibm Db2 9.5.0.1
Ibm Db2 9.5.0.4
Ibm Db2 9.5.0.5
445
VMScore
CVE-2012-2196
IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote malicious users to read arbitrary XML files via the (1) GET_WRAP_CFG_C or (2) GET_WRAP_CFG_C2 stored procedure.
Ibm Db2 9.1.0.1
Ibm Db2 9.1.0.2
Ibm Db2 9.1.0.6
Ibm Db2 9.1.0.7
Ibm Db2 9.1
Ibm Db2 9.1.0.5
Ibm Db2 9.1.0.11
Ibm Db2 9.1.0.3
Ibm Db2 9.1.0.8
Ibm Db2 9.1.0.4
Ibm Db2 9.1.0.9
Ibm Db2 9.1.0.10
Ibm Db2 9.5
Ibm Db2 9.5.0.1
Ibm Db2 9.5.0.4
Ibm Db2 9.5.0.5
Ibm Db2 9.5.0.6
Ibm Db2 9.5.0.3
Ibm Db2 9.5.0.2
Ibm Db2 9.5.0.7
Ibm Db2 9.5.0.8
Ibm Db2 9.5.0.9
445
VMScore
CVE-2012-0710
IBM DB2 9.1 before FP11, 9.5 before FP9, 9.7 before FP5, and 9.8 before FP4 allows remote malicious users to cause a denial of service (daemon crash) via a crafted Distributed Relational Database Architecture (DRDA) request.
Ibm Db2 9.5
Ibm Db2 9.7
Ibm Db2 9.1
Ibm Db2 9.8
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »