Vulnerabilities > IBM > DB2 > 10.5

DATE CVE VULNERABILITY TITLE RISK
2015-07-20 CVE-2014-8910 Injection vulnerability in IBM DB2
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read arbitrary text files via a crafted XML/XSLT function in a SELECT statement.
network
low complexity
ibm CWE-74
4.0
2015-05-08 CVE-2014-0919 Information Exposure vulnerability in IBM DB2
IBM DB2 9.5 through 10.5 on Linux, UNIX, and Windows stores passwords during the processing of certain SQL statements by the monitoring and audit facilities, which allows remote authenticated users to obtain sensitive information via commands associated with these facilities.
network
low complexity
ibm CWE-200
4.0
2014-12-18 CVE-2014-8901 Resource Management Errors vulnerability in IBM DB2
IBM DB2 9.5 through FP10, 9.7 through FP10, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP5 allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted XML query.
network
low complexity
ibm CWE-399
4.0
2014-12-12 CVE-2014-6209 Improper Input Validation vulnerability in IBM DB2
IBM DB2 9.5 through FP10, 9.7 through FP10, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP5 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) by specifying an identity column within a crafted ALTER TABLE statement.
network
low complexity
ibm CWE-20
4.0
2014-11-08 CVE-2014-6159 Improper Input Validation vulnerability in IBM DB2
IBM DB2 9.7 before FP10, 9.8 through FP5, 10.1 through FT4, and 10.5 through FP4 on Linux, UNIX, and Windows, when immediate AUTO_REVAL is enabled, allows remote authenticated users to cause a denial of service (daemon crash) via a crafted ALTER TABLE statement.
network
ibm CWE-20
3.5
2014-09-04 CVE-2014-4805 Information Exposure vulnerability in IBM DB2
IBM DB2 10.5 before FP4 on Linux and AIX creates temporary files during CDE table LOAD operations, which allows local users to obtain sensitive information by reading a file while a LOAD is occurring.
local
low complexity
ibm linux CWE-200
2.1
2014-09-04 CVE-2014-3095 Improper Input Validation vulnerability in IBM DB2
The SQL engine in IBM DB2 9.5 through FP10, 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted UNION clause in a subquery of a SELECT statement.
3.5
2014-09-04 CVE-2014-3094 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in IBM DB2
Stack-based buffer overflow in IBM DB2 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to execute arbitrary code via a crafted ALTER MODULE statement.
8.5
2014-05-30 CVE-2014-0907 Local Privilege Escalation vulnerability in Multiple IBM DB2 Products
Multiple untrusted search path vulnerabilities in unspecified (1) setuid and (2) setgid programs in IBM DB2 9.5, 9.7 before FP9a, 9.8, 10.1 before FP3a, and 10.5 before FP3a on Linux and UNIX allow local users to gain root privileges via a Trojan horse library.
local
low complexity
ibm
7.2
2014-05-30 CVE-2013-6744 Permissions, Privileges, and Access Controls vulnerability in IBM DB2
The Stored Procedure infrastructure in IBM DB2 9.5, 9.7 before FP9a, 10.1 before FP3a, and 10.5 before FP3a on Windows allows remote authenticated users to gain privileges by leveraging the CONNECT privilege and the CREATE_EXTERNAL_ROUTINE authority.
8.5