The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of DB2 UDB

IBM DB2: denial of service via TRUNCATE System Z
An attacker can generate a fatal error via TRUNCATE System Z of IBM DB2, in order to trigger a denial of service...
CVE-2018-1977, ibm10788089, VIGILANCE-VUL-28035
IBM DB2 LUW: file reading via IBM Spectrum Scale
A local attacker can read a file via IBM Spectrum Scale of IBM DB2 LUW, in order to obtain sensitive information...
CVE-2018-1723, ibm10734067, VIGILANCE-VUL-27899
IBM DB2: buffer overflow via db2pdcfg
An attacker can generate a buffer overflow via db2pdcfg of IBM DB2, in order to trigger a denial of service, and possibly to run code...
737295, CVE-2018-1897, ibm10737295, ibm10793417, VIGILANCE-VUL-27898
IBM DB2: four vulnerabilities
An attacker can use several vulnerabilities of IBM DB2...
CVE-2018-1780, CVE-2018-1781, CVE-2018-1799, CVE-2018-1834, ibm10733939, ibm10793415, VIGILANCE-VUL-27704
IBM DB2: privilege escalation via Untrusted Loaded Libraries
An attacker can bypass restrictions via Untrusted Loaded Libraries of IBM DB2, in order to escalate his privileges...
CVE-2018-1802, ibm10733122, VIGILANCE-VUL-27703
IBM DB2: privilege escalation via RCAC
An attacker can bypass restrictions via RCAC of IBM DB2, in order to escalate his privileges...
CVE-2018-1857, ibm10734059, VIGILANCE-VUL-27702
Apache Commons Compress: infinite loop via ZipArchiveInputStream
An attacker can generate an infinite loop via ZipArchiveInputStream of Apache Commons Compress, in order to trigger a denial of service...
6198380, CVE-2018-11771, FEDORA-2018-d29be920dc, VIGILANCE-VUL-27592
Oracle Java: vulnerabilities of October 2018
Several vulnerabilities were announced in Oracle products...
528379, CERTFR-2018-AVI-495, cpuoct2018, CVE-2018-3136, CVE-2018-3139, CVE-2018-3149, CVE-2018-3150, CVE-2018-3157, CVE-2018-3169, CVE-2018-3180, CVE-2018-3183, CVE-2018-3209, CVE-2018-3211, CVE-2018-3214, DLA-1590-1, DSA-2018-208, DSA-2019-131, DSA-4326-1, FEDORA-2018-209371341e, FEDORA-2018-369ab0efc9, FEDORA-2018-5857f28069, FEDORA-2018-cca64e06ba, FEDORA-2018-ce61c1147d, ibm10729607, ibm10741443, ibm10742147, ibm10742149, ibm10743955, ibm10793419, ibm10796096, ibm10875314, ibm10881644, ibm10882604, ibm10883400, openSUSE-SU-2018:3235-1, openSUSE-SU-2019:0042-1, openSUSE-SU-2019:0043-1, RHSA-2018:2942-01, RHSA-2018:2943-01, RHSA-2018:3000-01, RHSA-2018:3001-01, RHSA-2018:3002-01, RHSA-2018:3003-01, RHSA-2018:3007-01, RHSA-2018:3008-01, RHSA-2018:3350-01, RHSA-2018:3409-01, RHSA-2018:3521-01, RHSA-2018:3533-01, RHSA-2018:3534-01, RHSA-2018:3671-01, RHSA-2018:3672-01, SB10255, SUSE-SU-2018:3868-1, SUSE-SU-2018:3920-1, SUSE-SU-2018:3921-1, SUSE-SU-2018:3933-1, SUSE-SU-2018:4064-1, SUSE-SU-2019:0049-1, SUSE-SU-2019:0057-1, SUSE-SU-2019:0057-2, SUSE-SU-2019:0058-1, USN-3804-1, USN-3824-1, USN-3830-1, VIGILANCE-VUL-27509, ZDI-18-1263
IBM DB2: privilege escalation via Administrative Task Scheduler
An attacker can bypass restrictions via Administrative Task Scheduler of IBM DB2, in order to escalate his privileges...
729983, CVE-2018-1711, ibm10729983, ibm10733605, VIGILANCE-VUL-27261
IBM DB2: file reading via db2cacpy
A local attacker can read a file via db2cacpy of IBM DB2, in order to obtain sensitive information...
CVE-2018-1685, ibm10729979, VIGILANCE-VUL-27260
Our database contains other pages. You can request a free trial to read them.

Display information about DB2 UDB: