cpe:2.3:a:ibm:db2_universal_database:8:fp7:aix:*:*:*:*:*
dasauto in IBM DB2 8 before FP18, 9.1 before FP8, 9.5 before FP4, and 9.7 before FP1 permits execution by unprivileged user accounts, which has unspecified impact and local attack vectors.
Max CVSS
4.6
EPSS Score
0.05%
Published
2009-12-02
Updated
2009-12-07
The routine infrastructure component in IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP1 on Unix and Linux does not change the ownership of the db2fmp process, which has unknown impact and attack vectors.
Max CVSS
7.5
EPSS Score
0.83%
Published
2008-08-28
Updated
2017-08-08
Stack-based buffer overflow in db2dasrrm in the DB2 Administration Server (DAS) in IBM DB2 Universal Database 9.5 before Fix Pack 1, 9.1 before Fix Pack 4a, and 8 before FixPak 16 allows local users to execute arbitrary code via a long DASPROF environment variable.
Max CVSS
6.9
EPSS Score
0.04%
Published
2008-04-16
Updated
2017-07-29
db2dasrrm in the DB2 Administration Server (DAS) in IBM DB2 Universal Database 9.5 before Fix Pack 1, 9.1 before Fix Pack 4a, and 8 before FixPak 16 allows local users to overwrite arbitrary files via a symlink attack on files used for initialization.
Max CVSS
6.9
EPSS Score
0.04%
Published
2008-04-16
Updated
2017-07-29
IBM DB2 Universal Database (UDB) 9.1 GA through 9.1 FP1 allows local users with table SELECT privileges to perform unauthorized UPDATE and DELETE SQL commands via unknown vectors.
Max CVSS
7.2
EPSS Score
0.04%
Published
2007-02-23
Updated
2018-10-30
Buffer overflow in the TCP/IP listener in IBM DB2 Universal Database (UDB) before 8.1 FixPak 12 allows remote attackers to cause a denial of service (application crash) via a long MGRLVLLS message inside of an EXCSAT message when establishing a connection.
Max CVSS
5.0
EPSS Score
2.95%
Published
2006-06-19
Updated
2018-10-18
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!