Vulnerabilities > IBM > DB2 > 9.8

DATE CVE VULNERABILITY TITLE RISK
2024-01-22 CVE-2023-47141 Unspecified vulnerability in IBM DB2
IIBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 could allow an authenticated user with CONNECT privileges to cause a denial of service using a specially crafted query.
network
low complexity
ibm
6.5
2024-01-22 CVE-2023-47152 Unspecified vulnerability in IBM DB2
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an insecure cryptographic algorithm and to information disclosure in stack trace under exceptional conditions.
network
low complexity
ibm
7.5
2024-01-22 CVE-2023-45193 Unspecified vulnerability in IBM DB2
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 federated server is vulnerable to a denial of service when a specially crafted cursor is used.
network
low complexity
ibm
7.5
2024-01-22 CVE-2023-50308 Unspecified vulnerability in IBM DB2
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5 under certain circumstances could allow an authenticated user to the database to cause a denial of service when a statement is run on columnar tables.
network
low complexity
ibm
6.5
2023-12-04 CVE-2023-40687 Unspecified vulnerability in IBM DB2
IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted RUNSTATS command on an 8TB table.
network
low complexity
ibm
7.5
2018-01-16 CVE-2016-0215 Improper Input Validation vulnerability in IBM DB2
IBM DB2 9.7, 10.1 before FP6, and 10.5 before FP8 on AIX, Linux, HP, Solaris and Windows allow remote authenticated users to cause a denial of service (daemon crash) via a SELECT statement with a subquery containing the AVG OLAP function on an Oracle compatible database.
network
low complexity
ibm hp linux microsoft oracle CWE-20
4.0
2016-04-28 CVE-2016-0211 Improper Input Validation vulnerability in IBM DB2 and DB2 Connect
IBM DB2 9.7 through FP11, 9.8, 10.1 through FP5, and 10.5 through FP7 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted DRDA message.
network
low complexity
ibm CWE-20
4.0
2015-07-20 CVE-2015-1935 Code vulnerability in IBM DB2
The scalar-function implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.
network
low complexity
ibm CWE-17
8.0
2015-07-20 CVE-2015-1922 Improper Access Control vulnerability in IBM DB2
The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
network
ibm CWE-284
3.5
2015-07-20 CVE-2015-1883 Information Exposure vulnerability in IBM DB2
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read certain administrative files via crafted use of an automated-maintenance policy stored procedure.
network
low complexity
ibm CWE-200
4.0