Vulnerability Database

With exploit

ibm / db2

Title Severity Exploit Date Affected Version
CVE-2014-3095 Low Sep 4, 2014 == 9.5
== 9.5.0.1
== 9.5.0.2-a
== 9.5.0.2
== 9.5.0.3-a
== 9.5.0.3-b
== 9.5.0.3
== 9.5.0.4
== 9.5.0.4-a
== 9.5.0.5
== 9.5.0.6-a
== 9.5.0.7
== 9.5.0.8
== 9.5.0.9
== 9.5.0.10
== 9.7
== 9.7.0.1
== 9.7.0.2
== 9.7.0.3
== 9.7.0.4
== 9.7.0.5
== 9.7.0.6
== 9.7.0.7
== 9.7.0.8
== 9.7.0.9
== 9.7.0.9-a
== 9.8
== 9.8.0.3
== 9.8.0.4
== 9.8.0.5
== 10.1
== 10.1.0.1
== 10.1.0.2
== 10.1.0.3-a
== 10.1.0.3
== 10.1.0.4
== 10.5
== 10.5.0.1
== 10.5.0.2
== 10.5.0.3-a
== 10.5.0.3
CVE-2014-4805 Low Sep 4, 2014 == 10.5
== 10.5.0.1
== 10.5.0.2
== 10.5.0.3
== 10.5.0.3-a
CVE-2013-6744 High May 31, 2014 == 9.5
== 9.7
== 9.7.0.1
== 9.7.0.2
== 9.7.0.3
== 9.7.0.4
== 9.7.0.5
== 9.7.0.6
== 9.7.0.7
== 9.7.0.8
== 9.7.0.9
== 10.1
== 10.1.0.1
== 10.1.0.2
== 10.1.0.3
== 10.5
== 10.5.0.1
== 10.5.0.2
CVE-2014-0907 High May 31, 2014 == 9.7.0.6
== 9.5
== 10.1.0.2
== 9.7.0.3
== 9.7.0.8
== 9.7.0.4
== 10.1
== 9.7.0.7
== 10.5.0.1
== 10.1.0.1
== 9.7.0.1
== 9.7.0.9
== 9.7.0.2
== 10.1.0.3
== 9.7.0.5
== 9.7
== 10.5.0.2
== 10.5
CVE-2013-6717 Low Dec 19, 2013 == 9.7.0.6
== 9.7.0.3
== 9.7.0.8
== 9.7.0.4
== 9.7.0.7
== 9.7.0.1
== 9.7.0.9
== 9.7.0.2
== 9.7.0.5
== 9.7
== 9.8.0.4
== 9.8.0.3
== 9.8.0.5
== 9.8
== 10.5.0.1
== 10.5.0.2
== 10.5
== 10.1.0.2
== 10.1
== 10.1.0.1
== 10.1.0.3
CVE-2013-5466 Low Dec 18, 2013 == 9.5
== 10.1
== 9.7
== 10.5
== 9.8
CVE-2013-4032 Medium Oct 2, 2013 == 10.1
== 10.5
CVE-2013-4033 Low Aug 28, 2013 == 10.1
== 10.5
== 9.7
== 9.8
CVE-2013-3475 High Jun 5, 2013 == 9.5
== 9.1
== 10.1
== 9.7
== 9.8
CVE-2012-4826 High Oct 20, 2012 == 9.7.0.6
== 9.5
== 9.7.0.3
== 9.7.0.4
== 9.1
== 10.1
== 9.7.0.1
== 9.7.0.2
== 9.7.0.5
== 9.7
== 9.8