Filtered by vendor Ibm
Subscriptions
Filtered by product Db2 Universal Database
Subscriptions
Total
67 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2003-1052 | 1 Ibm | 2 Db2, Db2 Universal Database | 2025-04-03 | N/A |
IBM DB2 7.1 and 8.1 allow the bin user to gain root privileges by modifying the shared libraries that are used in setuid root programs. | ||||
CVE-2001-0052 | 1 Ibm | 1 Db2 Universal Database | 2025-04-03 | N/A |
IBM DB2 Universal Database version 6.1 allows users to cause a denial of service via a malformed query. | ||||
CVE-2005-3643 | 1 Ibm | 1 Db2 Universal Database | 2025-04-03 | N/A |
IBM DB2 Database server running on Windows XP with Simple File Sharing enabled, allows remote attackers to bypass authentication and log on to the guest account without supplying a password. | ||||
CVE-2005-4735 | 1 Ibm | 1 Db2 Universal Database | 2025-04-03 | N/A |
IBM DB2 Universal Database (UDB) 810 before 8.1 FP10 allows remote authenticated users to cause a denial of service (application crash) via (1) certain equality predicates that trigger self-removal, aka IY70808; and (2) a query with more than 32000 elements in the IN-list, aka LI70817. | ||||
CVE-2005-4868 | 2 Ibm, Microsoft | 2 Db2 Universal Database, Windows | 2025-04-03 | 7.1 High |
Shared memory sections and events in IBM DB2 8.1 have default permissions of read and write for the Everyone group, which allows local users to gain unauthorized access, gain sensitive information, such as cleartext passwords, and cause a denial of service. | ||||
CVE-2005-4738 | 1 Ibm | 1 Db2 Universal Database | 2025-04-03 | N/A |
IBM DB2 Universal Database (UDB) 810 before ESE AIX 5765F4100 does not ensure that a user has execute privileges before permitting object creation based on routines, which allows remote authenticated users to gain privileges. | ||||
CVE-2001-0051 | 1 Ibm | 1 Db2 Universal Database | 2025-04-03 | N/A |
IBM DB2 Universal Database version 6.1 creates an account with a default user name and password, which allows remote attackers to gain access to the database. |