Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

DB2 for Linux, UNIX and Windows — Vulnerabilities & Security Advisories 169

All 169 CVE vulnerabilities found in DB2 for Linux, UNIX and Windows, with AI-generated Chinese analysis, references, and POCs.

This page aggregates Common Weakness Enumeration (CWE) vulnerabilities specifically affecting the IBM DB2 for Linux, UNIX, and Windows database management system. It serves as a centralized repository for tracking security flaws within this commercial enterprise database product. The content collects reported vulnerabilities and security advisories from major vendors and public databases, covering the period from 2000 to the present day. Users can utilize this resource to track an entire vendor's security response history, understand the prevalence and impact of specific weakness classes such as buffer overflows or privilege escalation, and look up a particular product's vulnerability history to assess long-term risk profiles. By providing structured data on known issues, this aggregation supports security professionals, auditors, and developers in conducting thorough risk assessments and remediation planning. The data is compiled from official vendor bulletins, CVE entries, and third-party security reports to ensure comprehensiveness and accuracy. This information is critical for organizations relying on DB2 environments to maintain compliance with security standards and to prioritize patching efforts based on the severity and exploitability of the identified weaknesses. Access to this historical and current vulnerability data enables better decision-making regarding system hardening and upgrade strategies without requiring manual compilation of disparate security sources.

Vendor: IBM

CVE IDTitleCVSSSeverityPublished
CVE-2023-30443 IBM Db2 denial of service CWE-770 5.3 Medium2024-12-19
CVE-2024-41762 IBM Db2 denial of service CWE-789 5.3 Medium2024-12-07
CVE-2024-37071 IBM Db2 denial of service CWE-789 5.3 Medium2024-12-07
CVE-2024-41761 IBM Db2 denial of service CWE-789 5.3 Medium2024-11-23
CVE-2024-45663 IBM Db2 denial of service 6.5 Medium2024-11-21
CVE-2024-31880 IBM Db2 denial of service CWE-770 5.3 Medium2024-10-23
CVE-2024-31882 IBM Db2 denial of service CWE-943 5.3 Medium2024-08-14
CVE-2024-37529 IBM Db2 denial of service CWE-789 6.5 Medium2024-08-14
CVE-2024-35152 IBM Db2 denial of service CWE-789 6.5 Medium2024-08-14
CVE-2024-35136 IBM Db2 denial of service CWE-943 5.3 Medium2024-08-14
CVE-2023-29267 IBM Db2 denial of service CWE-399 5.3 Medium2024-06-12
CVE-2024-31881 IBM Db2 denial of service CWE-770 6.5 Medium2024-06-12
CVE-2024-28762 IBM Db2 denial of service CWE-770 5.3 Medium2024-06-12
CVE-2024-22360 IBM Db2 for Linux, UNIX and Windows denial of service CWE-20 5.3 Medium2024-04-03
CVE-2023-52296 IBM Db2 for Linux, UNIX and Windows denial of service CWE-20 5.3 Medium2024-04-03
CVE-2023-38729 IBM Db2 information disclosure CWE-200 6.8 Medium2024-04-03
CVE-2024-27254 IBM Db2 for Linux, UNIX and Windows denial of service CWE-20 5.3 Medium2024-04-03
CVE-2024-25046 IBM Db2 for Linux, UNIX and Windows denial of service CWE-20 5.3 Medium2024-04-03
CVE-2024-25030 IBM DB2 日志信息泄露漏洞 CWE-532 6.2 Medium2024-04-03
CVE-2023-47141 IBM Db2 denial of service CWE-20 5.3 Medium2024-01-22
CVE-2023-47158 IBM Db2 denial of service CWE-20 5.3 Medium2024-01-22
CVE-2023-47152 IBM Db2 information disclosure CWE-209 5.9 Medium2024-01-22
CVE-2023-27859 IBM Db2 code execution 6.5 Medium2024-01-22
CVE-2023-47747 IBM Db2 denial of service CWE-20 5.3 Medium2024-01-22
CVE-2023-45193 IBM Db2 denial of service CWE-20 5.9 Medium2024-01-22
CVE-2023-50308 IBM Db2 denial of service CWE-20 6.5 Medium2024-01-22
CVE-2023-47746 IBM Db2 denial of service CWE-20 5.3 Medium2024-01-22
CVE-2023-29258 IBM Db2 denial of service CWE-20 5.3 Medium2023-12-04
CVE-2023-40687 IBM Db2 denial of service CWE-20 5.3 Medium2023-12-04
CVE-2023-38727 IBM Db2 denial of service CWE-20 5.3 Medium2023-12-04

All 169 known CVE vulnerabilities affecting DB2 for Linux, UNIX and Windows with full Chinese analysis, references, and POCs where available.