Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 9.7 vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv2
CVE-2017-1297
IBM DB2 for Linux, UNIX and Windows 9.2, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) is vulnerable to a stack-based buffer overflow, caused by improper bounds checking which could allow a local malicious user to execute arbitrary code. IBM X-Force ID: 125159.
Ibm Db2 Connect 11.1.0.0
Ibm Db2 Connect 9.7
Ibm Db2 10.5
Ibm Db2 9.7
Ibm Db2 10.1
Ibm Data Server Runtime Client -
Ibm Data Server Driver For Odbc And Cli -
Ibm Db2 Connect 10.5
Ibm Db2 Connect 10.1
Ibm Db2 11.1
Ibm Data Server Client -
Ibm Data Server Driver Package -
1 EDB exploit
4.3
CVSSv2
CVE-2019-4102
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.0 uses weaker than expected cryptographic algorithms that could allow an malicious user to decrypt highly sensitive information. IBM X-Force ID: 158092.
Ibm Db2 9.7.0.0
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.10
Ibm Db2 9.7.0.11
Ibm Db2 10.1.0.0
Ibm Db2 10.1.0.1
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1.0.5
Ibm Db2 10.1.0.6
Ibm Db2 10.5.0.0
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.2
4.3
CVSSv2
CVE-2017-1520
IBM DB2 9.7, 10,1, 10.5, and 11.1 is vulnerable to an unauthorized command that allows the database to be activated when authentication type is CLIENT. IBM X-Force ID: 129830.
Ibm Db2 10.1
Ibm Db2 10.1.0.2
Ibm Db2 Connect 10.1.0.3
Ibm Db2 Connect 10.1.0.5
Ibm Db2 Connect 10.5.0.4
Ibm Db2 Connect 10.5.0.6
Ibm Db2 10.5.0.4
Ibm Db2 10.5.0.6
Ibm Db2 Connect 9.7.0.5
Ibm Db2 Connect 9.7.0.7
Ibm Db2 9.7
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.10
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.1.0.5
Ibm Db2 Connect 10.1
Ibm Db2 Connect 10.1.0.1
Ibm Db2 10.5
Ibm Db2 10.5.0.1
Ibm Db2 10.5.0.2
4.3
CVSSv2
CVE-2012-2180
The chaining functionality in the Distributed Relational Database Architecture (DRDA) module in IBM DB2 9.7 before FP6 and 9.8 before FP5 allows remote malicious users to cause a denial of service (NULL pointer dereference, and resource consumption or daemon crash) via a crafted ...
Ibm Db2 9.7.0.5
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.8
Ibm Db2 9.8.0.3
Ibm Db2 9.8.0.4
4.3
CVSSv2
CVE-2009-4326
The RAND scalar function in the Common Code Infrastructure component in IBM DB2 9.5 before FP5 and 9.7 before FP1, when the Database Partitioning Feature (DPF) is used, produces "repeating" return values, which might allow malicious users to defeat protection mechanisms...
Ibm Db2 9.5
Ibm Db2 9.7
4
CVSSv2
CVE-2022-22389
IBM Db2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may terminate abnormally when executing specially crafted SQL statements by an authenticated user. IBM X-Force ID: 2219740.
Ibm Db2 10.1
Ibm Db2 11.1
Ibm Db2 9.7
Ibm Db2 10.5
Ibm Db2 11.5
4
CVSSv2
CVE-2021-29777
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5, under specific circumstance of a table being dropped while being accessed in another session, could allow an authenticated user to cause a denial of srevice IBM X-Force ID: 203031.
Ibm Db2 9.7
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 11.1
Ibm Db2 11.5
4
CVSSv2
CVE-2016-0215
IBM DB2 9.7, 10.1 before FP6, and 10.5 before FP8 on AIX, Linux, HP, Solaris and Windows allow remote authenticated users to cause a denial of service (daemon crash) via a SELECT statement with a subquery containing the AVG OLAP function on an Oracle compatible database.
Ibm Db2 10.5
Ibm Db2 10.1
Ibm Db2 9.7
Ibm Db2 9.8
4
CVSSv2
CVE-2016-0211
IBM DB2 9.7 through FP11, 9.8, 10.1 through FP5, and 10.5 through FP7 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted DRDA message.
Ibm Db2 Connect 9.8.0.1
Ibm Db2 Connect 9.8.0.5
Ibm Db2 Connect 9.8.0.3
Ibm Db2 Connect 9.8.0.2
Ibm Db2 9.8.0.3
Ibm Db2 9.8.0.2
Ibm Db2 9.8.0.1
Ibm Db2 9.8.0.4
Ibm Db2 9.8.0.5
Ibm Db2 9.8
Ibm Db2 Connect 9.8.0.4
Ibm Db2 Connect 9.8
Ibm Db2 Connect 10.5.0.7
Ibm Db2 Connect 10.5.0.6
Ibm Db2 Connect 10.5.0.5
Ibm Db2 Connect 10.5.0.4
Ibm Db2 10.5.0.7
Ibm Db2 10.5.0.6
Ibm Db2 10.5.0.5
Ibm Db2 10.5.0.4
Ibm Db2 10.5.0.3
Ibm Db2 10.5.0.2
4
CVSSv2
CVE-2014-8910
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read arbitrary text files via a crafted XML/XSLT function in a SELECT statement.
Ibm Db2 9.7
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 10.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »