Vulnerabilities > IBM > DB2 > 9.5.0.9

DATE CVE VULNERABILITY TITLE RISK
2024-01-22 CVE-2023-47141 Unspecified vulnerability in IBM DB2
IIBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow an authenticated user with CONNECT privileges to cause a denial of service using a specially crafted query.
network
low complexity
ibm
6.5
2024-01-22 CVE-2023-47152 Unspecified vulnerability in IBM DB2
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an insecure cryptographic algorithm and to information disclosure in stack trace under exceptional conditions.
network
low complexity
ibm
7.5
2024-01-22 CVE-2023-45193 Unspecified vulnerability in IBM DB2
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 federated server is vulnerable to a denial of service when a specially crafted cursor is used.
network
low complexity
ibm
7.5
2024-01-22 CVE-2023-50308 Unspecified vulnerability in IBM DB2
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5 under certain circumstances could allow an authenticated user to the database to cause a denial of service when a statement is run on columnar tables.
network
low complexity
ibm
6.5
2023-12-04 CVE-2023-40687 Unspecified vulnerability in IBM DB2
IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted RUNSTATS command on an 8TB table.
network
low complexity
ibm
7.5
2014-09-04 CVE-2014-3095 Improper Input Validation vulnerability in IBM DB2
The SQL engine in IBM DB2 9.5 through FP10, 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted UNION clause in a subquery of a SELECT statement.
3.5
2012-07-25 CVE-2012-2197 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in IBM DB2
Stack-based buffer overflow in the Java Stored Procedure infrastructure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote authenticated users to execute arbitrary code by leveraging certain CONNECT and EXECUTE privileges.
network
high complexity
ibm CWE-119
7.1
2012-07-25 CVE-2012-2196 Information Exposure vulnerability in IBM DB2
IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to read arbitrary XML files via the (1) GET_WRAP_CFG_C or (2) GET_WRAP_CFG_C2 stored procedure.
network
low complexity
ibm CWE-200
5.0
2012-07-25 CVE-2012-2194 Path Traversal vulnerability in IBM DB2
Directory traversal vulnerability in the SQLJ.DB2_INSTALL_JAR stored procedure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to replace JAR files via unspecified vectors.
network
low complexity
ibm CWE-22
5.0
2011-11-09 CVE-2011-1373 Remote Denial of Service vulnerability in IBM DB2
Unspecified vulnerability in IBM DB2 9.7 before FP5 on UNIX, when the Self Tuning Memory Manager (STMM) feature and the AUTOMATIC DATABASE_MEMORY setting are configured, allows local users to cause a denial of service (daemon crash) via unknown vectors.
local
ibm
1.5