CVE-2005-4738
https://notcve.org/view.php?id=CVE-2005-4738
IBM DB2 Universal Database (UDB) 810 before ESE AIX 5765F4100 does not ensure that a user has execute privileges before permitting object creation based on routines, which allows remote authenticated users to gain privileges. • http://secunia.com/advisories/17031 http://www-1.ibm.com/support/docview.wss?uid=swg1IY71865 http://www.securityfocus.com/bid/15126 •
CVE-2005-4737
https://notcve.org/view.php?id=CVE-2005-4737
IBM DB2 Universal Database (UDB) 820 before ESE AIX 5765F4100 allows remote authenticated users to cause a denial of service (CPU consumption) by "abnormally" terminating a connection, which prevents db2agents from being properly cleared. • http://secunia.com/advisories/17031 http://www-1.ibm.com/support/docview.wss?uid=swg1IY71587 http://www.securityfocus.com/bid/15126 •
CVE-2005-4739
https://notcve.org/view.php?id=CVE-2005-4739
IBM DB2 Universal Database (UDB) 820 before version 8 FixPak 10 (s050811) allows remote authenticated users to cause a denial of service (application crash) by using a table function for an instance of snapshot_tbreorg, which triggers a trap in sqlnr_EStoE_action. • http://secunia.com/advisories/17031 http://www-1.ibm.com/support/docview.wss?uid=swg1IY72588 http://www.securityfocus.com/bid/15126 •
CVE-2005-4735
https://notcve.org/view.php?id=CVE-2005-4735
IBM DB2 Universal Database (UDB) 810 before 8.1 FP10 allows remote authenticated users to cause a denial of service (application crash) via (1) certain equality predicates that trigger self-removal, aka IY70808; and (2) a query with more than 32000 elements in the IN-list, aka LI70817. • http://secunia.com/advisories/17031 http://www-1.ibm.com/support/docview.wss?uid=swg1IY70808 http://www-1.ibm.com/support/docview.wss?uid=swg1LI70817 http://www.securityfocus.com/bid/15126 •
CVE-2005-4736
https://notcve.org/view.php?id=CVE-2005-4736
IBM DB2 Universal Database (UDB) 820 before 8.2 FP10 allows remote authenticated users to cause a denial of service (disk consumption) via a hash join (hsjn) that triggers an infinite loop in sqlri_hsjnFlushBlocks. • http://secunia.com/advisories/17031 http://www-1.ibm.com/support/docview.wss?uid=swg1IY70561 http://www.securityfocus.com/bid/15126 •