Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-0907
Multiple untrusted search path vulnerabilities in unspecified (1) setuid and (2) setgid programs in IBM DB2 9.5, 9.7 before FP9a, 9.8, 10.1 before FP3a, and 10.5 before FP3a on Linux and UNIX allow local users to gain root privileges via a Trojan horse library.
Ibm Db2 9.7.0.6
Ibm Db2 9.5
Ibm Db2 10.1.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.4
Ibm Db2 10.1
Ibm Db2 9.7.0.7
Ibm Db2 10.5.0.1
Ibm Db2 10.1.0.1
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.2
Ibm Db2 10.1.0.3
Ibm Db2 9.7.0.5
Ibm Db2 9.7
Ibm Db2 10.5.0.2
Ibm Db2 10.5
NA
CVE-2014-3074
The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.
Ibm Vios 2.2.0.13
Ibm Vios 2.2.1.0
Ibm Vios 2.2.0.11
Ibm Aix 7.1
Ibm Vios 2.2.0.12
Ibm Aix 6.1
Ibm Vios 2.2.1.1
Ibm Vios 2.2.1.3
Ibm Vios 2.2.0.10
Ibm Vios 2.2.3.2
Ibm Vios 2.2.1.8
Ibm Vios 2.2.2.4
Ibm Vios 2.2.1.4
Ibm Vios 2.2.3.0
Ibm Vios 2.2.3.3
Ibm Vios 2.2.2.5
Ibm Vios 2.2.1.9
Ibm Vios 2.2.2.0
NA
CVE-2013-6744
The Stored Procedure infrastructure in IBM DB2 9.5, 9.7 before FP9a, 10.1 before FP3a, and 10.5 before FP3a on Windows allows remote authenticated users to gain privileges by leveraging the CONNECT privilege and the CREATE_EXTERNAL_ROUTINE authority.
Ibm Db2 9.5
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.9
Ibm Db2 10.1
Ibm Db2 10.1.0.1
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.3
Ibm Db2 10.5
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.2
7.8
CVSSv3
CVE-2017-1451
IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128178.
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.10
Ibm Db2 9.7.0.11
Ibm Db2 10.1
Ibm Db2 10.1.0.1
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1.0.5
Ibm Db2 10.5
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.3
7.8
CVSSv3
CVE-2017-1452
IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user to obtain elevated privilege and overwrite DB2 files. IBM X-Force ID: 128180.
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.10
Ibm Db2 9.7.0.11
Ibm Db2 10.1
Ibm Db2 10.1.0.1
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1.0.5
Ibm Db2 10.5
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.3
3.7
CVSSv3
CVE-2017-1520
IBM DB2 9.7, 10,1, 10.5, and 11.1 is vulnerable to an unauthorized command that allows the database to be activated when authentication type is CLIENT. IBM X-Force ID: 129830.
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.10
Ibm Db2 9.7.0.11
Ibm Db2 10.1
Ibm Db2 10.1.0.1
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1.0.5
Ibm Db2 10.5
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.3
6.7
CVSSv3
CVE-2017-1439
IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128058.
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.10
Ibm Db2 9.7.0.11
Ibm Db2 10.1
Ibm Db2 10.1.0.1
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1.0.5
Ibm Db2 10.5
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.3
7.3
CVSSv3
CVE-2016-5995
Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program.
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.10
Ibm Db2 9.7.0.11
Ibm Db2 10.1
Ibm Db2 10.1.0.1
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1.0.5
Ibm Db2 10.5
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.3
6.7
CVSSv3
CVE-2017-1438
IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128057.
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.10
Ibm Db2 9.7.0.11
Ibm Db2 10.1
Ibm Db2 10.1.0.1
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1.0.5
Ibm Db2 10.5
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.3
NA
CVE-2006-4257
IBM DB2 Universal Database (UDB) prior to 8.1 FixPak 13 allows remote authenticated users to cause a denial of service (crash) by (1) sending the first ACCSEC command without an RDBNAM parameter during the CONNECT process, or (2) sending crafted SQLJRA packet, which results in a ...
Ibm Db2 8.1.8
Ibm Db2 8.1.8a
Ibm Db2 8.1.7b
Ibm Db2 8.1.9a
Ibm Db2 8.1.7
Ibm Db2 8.1.6
Ibm Db2 8.12
Ibm Db2 8.1.4
Ibm Db2 8.1.9
Ibm Db2 8.1.5
Ibm Db2 8.0
Ibm Db2 8.1.6c
Ibm Db2 8.2
Ibm Db2 8.1
Ibm Db2 8.10
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »