Vulnerabilities > IBM > DB2 > 10.5

DATE CVE VULNERABILITY TITLE RISK
2017-09-12 CVE-2017-1438 Unspecified vulnerability in IBM DB2 and DB2 Connect
IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access.
local
low complexity
ibm linux microsoft
7.2
2017-06-27 CVE-2017-1297 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM products
IBM DB2 for Linux, UNIX and Windows 9.2, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) is vulnerable to a stack-based buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code.
4.4
2017-06-27 CVE-2017-1105 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM products
IBM DB2 for Linux, UNIX and Windows 9.2, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) is vulnerable to a buffer overflow that could allow a local user to overwrite DB2 files or cause a denial of service.
local
low complexity
ibm linux microsoft CWE-119
3.6
2017-03-08 CVE-2017-1150 Improper Privilege Management vulnerability in IBM DB2 10.1/10.5/11.1
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.1, 10.5, and 11.1 could allow an authenticated attacker with specialized access to tables that they should not be permitted to view.
network
ibm CWE-269
3.5
2016-10-01 CVE-2016-5995 Permissions, Privileges, and Access Controls vulnerability in IBM DB2 and DB2 Connect
Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program.
6.9
2016-04-28 CVE-2016-0211 Improper Input Validation vulnerability in IBM DB2 and DB2 Connect
IBM DB2 9.7 through FP11, 9.8, 10.1 through FP5, and 10.5 through FP7 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted DRDA message.
network
low complexity
ibm CWE-20
4.0
2015-07-20 CVE-2015-1935 Code vulnerability in IBM DB2
The scalar-function implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.
network
low complexity
ibm CWE-17
8.0
2015-07-20 CVE-2015-1922 Improper Access Control vulnerability in IBM DB2
The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
network
ibm CWE-284
3.5
2015-07-20 CVE-2015-1883 Information Exposure vulnerability in IBM DB2
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read certain administrative files via crafted use of an automated-maintenance policy stored procedure.
network
low complexity
ibm CWE-200
4.0
2015-07-20 CVE-2015-0157 Improper Input Validation vulnerability in IBM DB2
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) by leveraging an unspecified scalar function in a SQL statement.
network
low complexity
ibm CWE-20
6.8