Filtered by vendor Ibm
Subscriptions
Filtered by product Db2
Subscriptions
Total
279 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2011-0731 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
Buffer overflow in the DB2 Administration Server (DAS) component in IBM DB2 9.1 before FP10, 9.5 before FP7, and 9.7 before FP3 on Linux, UNIX, and Windows allows remote attackers to execute arbitrary code via unspecified vectors. | ||||
CVE-2010-3740 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
The Net Search Extender (NSE) implementation in the Text Search component in IBM DB2 UDB 9.5 before FP6a does not properly handle an alphanumeric Fuzzy search, which allows remote authenticated users to cause a denial of service (memory consumption and system hang) via the db2ext.textSearch function. | ||||
CVE-2010-3738 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
The Security component in IBM DB2 UDB 9.5 before FP6a logs AUDIT events by using a USERID and an AUTHID value corresponding to the instance owner, instead of a USERID and an AUTHID value corresponding to the logged-in user account, which makes it easier for remote authenticated users to execute Audit administration commands without discovery. | ||||
CVE-2010-3737 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
Memory leak in the Relational Data Services component in IBM DB2 UDB 9.5 before FP6a allows remote authenticated users to cause a denial of service (heap memory consumption) by executing a (1) user-defined function (UDF) or (2) stored procedure while using a different code page than the database server. | ||||
CVE-2010-3736 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
Memory leak in the Relational Data Services component in IBM DB2 UDB 9.5 before FP6a, when the connection concentrator is enabled, allows remote authenticated users to cause a denial of service (heap memory consumption) by using a different code page than the database server. | ||||
CVE-2010-3735 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
The "Query Compiler, Rewrite, Optimizer" component in IBM DB2 UDB 9.5 before FP6a allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted query involving certain UNION ALL views, leading to an indefinitely large amount of compilation time. | ||||
CVE-2010-3734 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
The Install component in IBM DB2 UDB 9.5 before FP6a on Linux, UNIX, and Windows enforces an unintended limit on password length, which makes it easier for attackers to obtain access via a brute-force attack. | ||||
CVE-2010-3733 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
The Engine Utilities component in IBM DB2 UDB 9.5 before FP6a uses world-writable permissions for the sqllib/cfg/db2sprf file, which might allow local users to gain privileges by modifying this file. | ||||
CVE-2010-3732 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
The DRDA Services component in IBM DB2 UDB 9.5 before FP6a allows remote authenticated users to cause a denial of service (database server ABEND) by using the client CLI on Linux, UNIX, or Windows for executing a prepared statement with a large number of parameter markers. | ||||
CVE-2010-3731 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
Stack-based buffer overflow in the validateUser implementation in the com.ibm.db2.das.core.DasSysCmd function in db2dasrrm in the DB2 Administration Server (DAS) component in IBM DB2 9.1 before FP10, 9.5 before FP6a, and 9.7 before FP3 allows remote attackers to execute arbitrary code via a long username string. | ||||
CVE-2010-3475 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
IBM DB2 9.7 before FP3 does not properly enforce privilege requirements for execution of entries in the dynamic SQL cache, which allows remote authenticated users to bypass intended access restrictions by leveraging the cache to execute an UPDATE statement contained in a compiled compound SQL statement. | ||||
CVE-2010-3474 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
IBM DB2 9.7 before FP3 does not perform the expected drops or invalidations of dependent functions upon a loss of privileges by the functions' owners, which allows remote authenticated users to bypass intended access restrictions via calls to these functions, a different vulnerability than CVE-2009-3471. | ||||
CVE-2010-3197 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
IBM DB2 9.7 before FP2 does not perform the expected access control on the monitor administrative views in the SYSIBMADM schema, which allows remote attackers to obtain sensitive information via unspecified vectors. | ||||
CVE-2010-3196 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
IBM DB2 9.7 before FP2, when AUTO_REVAL is IMMEDIATE, allows remote authenticated users to cause a denial of service (loss of privileges) to a view owner by defining a dependent view. | ||||
CVE-2010-3195 | 2 Ibm, Microsoft | 2 Db2, Windows Server 2008 | 2024-11-21 | N/A |
Unspecified vulnerability in IBM DB2 9.1 before FP9, 9.5 before FP6, and 9.7 before FP2 on Windows Server 2008 allows attackers to cause a denial of service (trap) via vectors involving "special group and user enumeration." | ||||
CVE-2010-3194 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
The DB2DART program in IBM DB2 9.1 before FP9, 9.5 before FP6, and 9.7 before FP2 allows attackers to bypass intended file access restrictions via unspecified vectors related to overwriting files owned by an instance owner. | ||||
CVE-2010-3193 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
Unspecified vulnerability in the DB2STST program in IBM DB2 9.1 before FP9, 9.5 before FP6, and 9.7 before FP2 has unknown impact and attack vectors. | ||||
CVE-2010-1560 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
Buffer overflow in the REPEAT function in IBM DB2 9.1 before FP9 allows remote authenticated users to cause a denial of service (trap) via unspecified vectors. NOTE: this might overlap CVE-2010-0462. | ||||
CVE-2010-0472 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
kuddb2 in Tivoli Monitoring for DB2, as distributed in IBM DB2 9.7 FP1 on Linux, allows remote attackers to cause a denial of service (daemon crash) via a certain byte sequence. | ||||
CVE-2010-0462 | 1 Ibm | 1 Db2 | 2024-11-21 | N/A |
Heap-based buffer overflow in IBM DB2 9.1 before FP9, 9.5 before FP6, and 9.7 before FP2 allows remote authenticated users to have an unspecified impact via a SELECT statement that has a long column name generated with the REPEAT function. |