Ibm

Db2

292 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.95%
  • Published 28.08.2013 13:13:58
  • Last modified 11.04.2025 00:51:21

IBM DB2 and DB2 Connect 9.7 through FP8, 9.8 through FP5, 10.1 through FP2, and 10.5 through FP1 allow remote authenticated users to execute DML statements by leveraging EXPLAIN authority.

  • EPSS 0.09%
  • Published 05.06.2013 03:43:48
  • Last modified 11.04.2025 00:51:21

Stack-based buffer overflow in db2aud in the Audit Facility in IBM DB2 and DB2 Connect 9.1, 9.5, 9.7, 9.8, and 10.1, as used in Smart Analytics System 7600 and other products, allows local users to gain privileges via unspecified vectors.

  • EPSS 18.37%
  • Published 20.10.2012 10:41:27
  • Last modified 11.04.2025 00:51:21

Stack-based buffer overflow in the SQL/PSM (aka SQL Persistent Stored Module) Stored Procedure (SP) infrastructure in IBM DB2 9.1, 9.5, 9.7 before FP7, 9.8, and 10.1 might allow remote authenticated users to execute arbitrary code by debugging a stor...

  • EPSS 0.95%
  • Published 25.09.2012 20:55:01
  • Last modified 11.04.2025 00:51:21

Directory traversal vulnerability in the UTL_FILE module in IBM DB2 and DB2 Connect 10.1 before FP1 on Windows allows remote authenticated users to modify, delete, or read arbitrary files via a pathname in the file field.

  • EPSS 0.13%
  • Published 24.08.2012 10:36:42
  • Last modified 11.04.2025 00:51:21

Unspecified vulnerability in the XML feature in IBM DB2 9.7 before FP6 on Linux, UNIX, and Windows allows remote authenticated users to read arbitrary XML files via unknown vectors.

  • EPSS 0.65%
  • Published 25.07.2012 10:42:34
  • Last modified 11.04.2025 00:51:21

Directory traversal vulnerability in the SQLJ.DB2_INSTALL_JAR stored procedure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to replace JAR files via unspecified vectors.

  • EPSS 0.62%
  • Published 25.07.2012 10:42:34
  • Last modified 11.04.2025 00:51:21

IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to read arbitrary XML files via the (1) GET_WRAP_CFG_C or (2) GET_WRAP_CFG_C2 stored procedure.

  • EPSS 12.87%
  • Published 25.07.2012 10:42:34
  • Last modified 11.04.2025 00:51:21

Stack-based buffer overflow in the Java Stored Procedure infrastructure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote authenticated users to execute arbitrary code by leveraging certain CONNECT ...

  • EPSS 1%
  • Published 20.06.2012 10:27:28
  • Last modified 11.04.2025 00:51:21

The chaining functionality in the Distributed Relational Database Architecture (DRDA) module in IBM DB2 9.7 before FP6 and 9.8 before FP5 allows remote attackers to cause a denial of service (NULL pointer dereference, and resource consumption or daem...

  • EPSS 0.34%
  • Published 20.03.2012 20:55:01
  • Last modified 11.04.2025 00:51:21

IBM DB2 9.5 before FP9, 9.7 through FP5, and 9.8 through FP4 does not properly check variables, which allows remote authenticated users to bypass intended restrictions on viewing table data by leveraging the CREATEIN privilege to execute crafted SQL ...