The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of IBM DB2 UDB

IBM DB2: denial of service via DRDA
An attacker can send a malicious DRDA packet to IBM DB2, in order to trigger a denial of service...
1610582, 1979984, CVE-2016-0211, VIGILANCE-VUL-19484
Windows, Samba: code execution via Badlock
An attacker can use the Badlock vulnerability of Windows or Samba, in order to run code...
1986595, 1987766, 3148527, 9010080, bulletinjan2016, bulletinoct2016, c05162399, CVE-2015-5370, CVE-2016-0128, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112, CVE-2016-2113, CVE-2016-2114, CVE-2016-2115, CVE-2016-2118, DLA-509-1, DSA-3548-1, DSA-3548-2, DSA-3548-3, FEDORA-2016-48b3761baa, FEDORA-2016-be53260726, HPSBUX03616, MS16-047, NTAP-20160412-0001, openSUSE-SU-2016:1025-1, openSUSE-SU-2016:1064-1, openSUSE-SU-2016:1106-1, openSUSE-SU-2016:1107-1, openSUSE-SU-2016:1108-1, openSUSE-SU-2016:1440-1, RHSA-2016:0611-01, RHSA-2016:0612-01, RHSA-2016:0613-01, RHSA-2016:0618-01, RHSA-2016:0619-01, RHSA-2016:0620-01, RHSA-2016:0621-01, RHSA-2016:0623-01, RHSA-2016:0624-01, RHSA-2016:0625-01, SA122, SA40196, SOL37603172, SOL53313971, SSA:2016-106-02, SSRT110128, SUSE-SU-2016:1022-1, SUSE-SU-2016:1023-1, SUSE-SU-2016:1024-1, SUSE-SU-2016:1028-1, SUSE-SU-2016:1105-1, USN-2950-1, USN-2950-2, USN-2950-3, USN-2950-4, USN-2950-5, VIGILANCE-VUL-19207, VU#813296
Samba: two vulnerabilities
An attacker can use several vulnerabilities of Samba...
1986595, c05121842, CERTFR-2016-AVI-084, CVE-2015-7560, CVE-2016-0771, DSA-3514-1, FEDORA-2016-cad77a4576, FEDORA-2016-ed1587f6ba, HPSBUX03596, openSUSE-SU-2016:0813-1, openSUSE-SU-2016:0877-1, openSUSE-SU-2016:1064-1, openSUSE-SU-2016:1106-1, openSUSE-SU-2016:1107-1, openSUSE-SU-2016:1108-1, openSUSE-SU-2016:1440-1, RHSA-2016:0448-01, RHSA-2016:0449-01, SSA:2016-068-02, SUSE-SU-2016:0814-1, SUSE-SU-2016:0816-1, SUSE-SU-2016:0837-1, SUSE-SU-2016:0905-1, USN-2922-1, VIGILANCE-VUL-19118
OkHttp: Man-in-the-Middle of Certificate Pining
An attacker can act as a Man-in-the-Middle of Certificate Pining on OkHttp, in order to read or write data in the session...
6198380, CVE-2016-2402, FEDORA-2016-65b7608d8b, VIGILANCE-VUL-19049
Apache Xerces-C: buffer overflow
An attacker can generate a buffer overflow of Apache Xerces-C, in order to trigger a denial of service, and possibly to run code...
1610582, 1983969, 1984073, 1987066, 1990410, 2002647, cpuapr2017, cpuoct2018, CVE-2016-0729, DSA-3493-1, FEDORA-2016-0a061f6dd9, FEDORA-2016-7615febbd6, FEDORA-2016-87e8468465, FEDORA-2016-880b91c090, FEDORA-2016-ae9ac16cf3, openSUSE-SU-2016:0966-1, openSUSE-SU-2016:1121-1, RHSA-2016:0430-01, VIGILANCE-VUL-19033
IBM DB2: three vulnerabilities of General Parallel File System
An attacker can use several vulnerabilities of General Parallel File System of IBM DB2...
1610582, 1972152, CVE-2015-4974, CVE-2015-4981, CVE-2015-7403, VIGILANCE-VUL-19001
IBM GSKit: information disclosure via MD5 collisions
An attacker can use a vulnerability in GSKit of IBM, in order to obtain sensitive information...
1610582, 1974466, 1974785, 1975839, CVE-2016-0201, VIGILANCE-VUL-18756
Mozilla NSS, OpenSSL, Oracle Java: MD5 allowed in TLS 1.2
An attacker can create a MD5 collision in a TLS 1.2 session of Mozilla NSS, OpenSSL or Oracle Java, in order to capture data belonging to this session...
000008896, 1974958, 1975290, 1975424, 1976113, 1976148, 1976200, 1976262, 1976362, 1976363, 1977405, 1977517, 1977518, 1977523, 9010065, cpujan2016, cpuoct2017, CVE-2015-7575, DSA-3436-1, DSA-3457-1, DSA-3465-1, DSA-3491-1, DSA-3688-1, FEDORA-2016-4aeba0f53d, MFSA-2015-150, NTAP-20160225-0001, NTAP20160225-001, openSUSE-SU-2015:2405-1, openSUSE-SU-2016:0007-1, openSUSE-SU-2016:0161-1, openSUSE-SU-2016:0162-1, openSUSE-SU-2016:0263-1, openSUSE-SU-2016:0268-1, openSUSE-SU-2016:0270-1, openSUSE-SU-2016:0272-1, openSUSE-SU-2016:0279-1, openSUSE-SU-2016:0307-1, openSUSE-SU-2016:0308-1, openSUSE-SU-2016:0488-1, RHSA-2016:0007-01, RHSA-2016:0008-01, RHSA-2016:0049-01, RHSA-2016:0050-01, RHSA-2016:0053-01, RHSA-2016:0054-01, RHSA-2016:0055-01, RHSA-2016:0056-01, RHSA-2016:0098-01, RHSA-2016:0099-01, RHSA-2016:0100-01, RHSA-2016:0101-01, SA108, SLOTH, SUSE-SU-2016:0256-1, SUSE-SU-2016:0265-1, SUSE-SU-2016:0269-1, SUSE-SU-2016:0390-1, SUSE-SU-2016:0399-1, SUSE-SU-2016:0401-1, SUSE-SU-2016:0428-1, SUSE-SU-2016:0431-1, SUSE-SU-2016:0433-1, SUSE-SU-2016:0770-1, SUSE-SU-2016:0776-1, USN-2863-1, USN-2864-1, USN-2866-1, USN-2884-1, USN-2904-1, VIGILANCE-VUL-18586
IBM DB2 9.7: eight vulnerabilities
An attacker can use several vulnerabilities of IBM DB2 9.7...
1450666, CVE-2014-6209, CVE-2014-6210, CVE-2014-8901, CVE-2014-8910, CVE-2015-0157, CVE-2015-1883, CVE-2015-1922, CVE-2015-1935, IT04138, IT04786, IT05647, IT05652, IT05933, IT05939, IT06354, IT07108, IT08080, IT08525, IT08543, VIGILANCE-VUL-18623
IBM DB2: privilege escalation via Binaries Build
A local attacker can use IBM DB2, in order to escalate his privileges...
1610582, 1647054, 1970376, 1979698, CVE-2015-1947, IT08753, VIGILANCE-VUL-18622
Our database contains other pages. You can request a free trial to read them.

Display information about IBM DB2 UDB: