Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
db2 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2023-47145
IBM Db2 for Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow a local user to escalate their privileges to the SYSTEM user using the MSI repair functionality. IBM X-Force ID: 270402.
Ibm Db2
7.8
CVSSv3
CVE-2023-27558
IBM Db2 on Windows 10.5, 11.1, and 11.5 may be vulnerable to a privilege escalation caused by at least one installed service using an unquoted service path. A local attacker could exploit this vulnerability to gain elevated privileges by inserting an executable file in the path o...
Ibm Db2 10.5.0.11
Ibm Db2 11.1.4.7
Ibm Db2 11.5
7.8
CVSSv3
CVE-2023-30431
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 db2set is vulnerable to a buffer overflow, caused by improper bounds checking. An attacker could overflow the buffer and execute arbitrary code. IBM X-Force ID: 252184.
Ibm Db2 10.5.0.11
Ibm Db2 11.1.4.7
Ibm Db2 11.5
7.8
CVSSv3
CVE-2019-4588
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local user to execute arbitrary code and conduct DLL hijacking attacks.
Ibm Db2 10.1
Ibm Db2 11.1
Ibm Db2 9.7
Ibm Db2 10.5
Ibm Db2 11.5
7.8
CVSSv3
CVE-2020-5025
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 db2fm is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local malicious user to execute arbitrary code on the system with root privileges. IB...
Ibm Db2 9.7
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2
Netapp Oncommand Insight -
7.8
CVSSv3
CVE-2020-4739
IBM DB2 Accessories Suite for Linux, UNIX, and Windows, DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local authenticated malicious user to execute arbitrary code on the system, caused by DLL search order hijacking vul...
Ibm Db2 9.7.0.0
Ibm Db2 10.1.0.0
Ibm Db2 10.5.0.0
Ibm Db2 11.1.0.0
Ibm Db2
1 Article
7.8
CVSSv3
CVE-2020-4701
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local malicious user to execute arbitrary code on the system with root privileges.
Ibm Db2 10.5
Ibm Db2 11.1
Ibm Db2 11.5
7.8
CVSSv3
CVE-2020-4363
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local malicious user to execute arbitrary code on the system with root privileges. IBM X-Fo...
Ibm Db2 9.7.0.0
Ibm Db2 10.1.0.0
Ibm Db2 10.5.0.0
Ibm Db2 11.1.0.0
Ibm Db2 11.5.0.0
7.8
CVSSv3
CVE-2020-4204
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local malicious user to execute arbitrary code on the system with root privileges. IBM X-Fo...
Ibm Db2 9.7
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 11.1
Ibm Db2 11.5
7.8
CVSSv3
CVE-2019-4606
IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 could allow a local malicious user to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary cod...
Ibm Db2 High Performance Unload Load 5.1.0.0
Ibm Db2 High Performance Unload Load 5.1.0.1
Ibm Db2 High Performance Unload Load 6.1.0.0
Ibm Db2 High Performance Unload Load 6.1.0.1
Ibm Db2 High Performance Unload Load 6.1.0.2
Ibm Db2 High Performance Unload Load 6.1.0.3
Ibm Db2 High Performance Unload Load 6.5.0.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »