Ibm

Db2

292 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.55%
  • Published 28.04.2016 01:59:00
  • Last modified 12.04.2025 10:46:40

IBM DB2 9.7 through FP11, 9.8, 10.1 through FP5, and 10.5 through FP7 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted DRDA message.

  • EPSS 3.17%
  • Published 20.07.2015 01:59:06
  • Last modified 12.04.2025 10:46:40

The scalar-function implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.

  • EPSS 0.23%
  • Published 20.07.2015 01:59:05
  • Last modified 12.04.2025 10:46:40

The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspec...

  • EPSS 0.34%
  • Published 20.07.2015 01:59:04
  • Last modified 12.04.2025 10:46:40

IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read certain administrative files via crafted use of an automated-maintenance policy stored procedure.

  • EPSS 1.54%
  • Published 20.07.2015 01:59:03
  • Last modified 12.04.2025 10:46:40

IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) by leveraging an unspecified scalar function in a SQL statement...

  • EPSS 0.25%
  • Published 20.07.2015 01:59:00
  • Last modified 12.04.2025 10:46:40

IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read arbitrary text files via a crafted XML/XSLT function in a SELECT statement.

  • EPSS 0.36%
  • Published 08.05.2015 01:59:00
  • Last modified 12.04.2025 10:46:40

IBM DB2 9.5 through 10.5 on Linux, UNIX, and Windows stores passwords during the processing of certain SQL statements by the monitoring and audit facilities, which allows remote authenticated users to obtain sensitive information via commands associa...

  • EPSS 1.58%
  • Published 18.12.2014 16:59:18
  • Last modified 12.04.2025 10:46:40

IBM DB2 9.5 through FP10, 9.7 through FP10, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP5 allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted XML query.

  • EPSS 1.56%
  • Published 12.12.2014 16:59:01
  • Last modified 12.04.2025 10:46:40

IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP5 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) by specifying the same column within multiple ALTER TABLE state...

  • EPSS 1.6%
  • Published 12.12.2014 16:59:00
  • Last modified 12.04.2025 10:46:40

IBM DB2 9.5 through FP10, 9.7 through FP10, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP5 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) by specifying an identity column within a cra...