Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
db2_universal_database Vendor: ibm

About This Product

db2_universal_database is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 67 known vulnerabilities affecting ibm db2_universal_database. This includes 31 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2001 to 2010, indicating a sustained research interest and ongoing security attention. 33 medium-severity issues and 3 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2001-0051 2001-02-16 2025-04-03 - 7.5 Likely
CVE-2001-0052 2001-02-16 2025-04-03 - 2.1 Unknown
CVE-2001-1143 2001-07-11 2025-04-03 - 5.0 Likely
CVE-2003-0758 2003-10-06 2025-04-03 - 7.2 Unknown
CVE-2003-0759 2003-10-06 2025-04-03 - 7.2 Unknown
CVE-2003-0827 2003-10-06 2025-04-03 - 5.0 Likely
CVE-2003-0836 2003-11-17 2025-04-03 - 7.5 Likely
CVE-2003-0837 2003-11-17 2025-04-03 - 7.5 Likely
CVE-2003-0898 2003-11-17 2025-04-03 - 4.6 Unknown
CVE-2004-1372 2004-09-01 2025-04-03 - 7.2 Unknown
CVE-2002-1583 2004-09-28 2025-04-03 - 7.2 Unknown
CVE-2003-1049 2004-09-28 2025-04-03 - 4.6 Unknown
CVE-2003-1052 2004-09-28 2025-04-03 - 7.2 Unknown
CVE-2004-0795 2004-10-20 2025-04-03 - 7.2 Unknown
CVE-2005-0417 2005-04-27 2025-04-03 - 10.0 Likely
CVE-2005-3643 2005-11-16 2025-04-03 - 7.5 Likely
CVE-2005-4735 2005-12-31 2025-04-03 - 6.8 Likely
CVE-2005-4736 2005-12-31 2025-04-03 - 6.8 Likely
CVE-2005-4737 2005-12-31 2025-04-03 - 7.5 Likely
CVE-2005-4738 2005-12-31 2025-04-03 - 6.5 Likely
CVE-2005-4739 2005-12-31 2025-04-03 - 6.8 Likely
CVE-2005-4740 2005-12-31 2025-04-03 - 4.0 Likely
CVE-2005-4863 2005-12-31 2025-04-03 - 7.2 Unknown
CVE-2005-4864 2005-12-31 2025-04-03 - 7.2 Unknown
CVE-2005-4865 2005-12-31 2025-04-03 - 10.0 Likely
CVE-2005-4866 2005-12-31 2025-04-03 - 6.8 Likely
CVE-2005-4867 2005-12-31 2025-04-03 - 9.3 Likely
CVE-2005-4868 2005-12-31 2025-04-03 7.1 2.1 Unknown
CVE-2006-3066 2006-06-19 2025-04-03 - 5.0 Likely
CVE-2006-3067 2006-06-19 2025-04-03 - 5.0 Likely
CVE-2006-3068 2006-06-19 2025-04-03 - 5.0 Likely
CVE-2006-6638 2006-12-19 2025-04-09 - 5.0 Likely
CVE-2007-1086 2007-02-23 2025-04-09 - 7.2 Unknown
CVE-2007-1089 2007-02-23 2025-04-09 - 7.2 Unknown
CVE-2007-4270 2007-08-18 2025-04-09 - 6.9 Unknown
CVE-2007-4271 2007-08-18 2025-04-09 - 2.1 Unknown
CVE-2007-4272 2007-08-18 2025-04-09 - 1.9 Unknown
CVE-2007-4273 2007-08-18 2025-04-09 - 4.6 Unknown
CVE-2007-4275 2007-08-18 2025-04-09 - 6.9 Unknown
CVE-2007-4276 2007-08-18 2025-04-09 - 6.9 Unknown
CVE-2007-4417 2007-08-18 2025-04-09 - 6.0 Unknown
CVE-2007-4418 2007-08-18 2025-04-09 - 5.5 Likely
CVE-2007-4423 2007-08-18 2025-04-09 - 5.0 Likely
CVE-2007-6045 2007-11-20 2025-04-09 - 10.0 Likely
CVE-2007-6046 2007-11-20 2025-04-09 - 7.2 Unknown
CVE-2007-6047 2007-11-20 2025-04-09 - 10.0 Likely
CVE-2007-6048 2007-11-20 2025-04-09 - 10.0 Likely
CVE-2007-6049 2007-11-20 2025-04-09 - 7.2 Unknown
CVE-2007-6050 2007-11-20 2025-04-09 - 7.2 Unknown
CVE-2007-6051 2007-11-20 2025-04-09 - 10.0 Likely
CVE-2007-6052 2007-11-20 2025-04-09 - 7.8 Likely
CVE-2007-6053 2007-11-20 2025-04-09 - 9.3 Likely
CVE-2007-5757 2008-02-13 2025-04-09 - 6.9 Unknown
CVE-2007-5664 2008-04-16 2025-04-09 - 6.9 Unknown
CVE-2007-5758 2008-04-16 2025-04-09 - 6.9 Unknown
CVE-2008-3852 2008-08-28 2025-04-09 - 6.5 Likely
CVE-2008-3853 2008-08-28 2025-04-09 - 9.3 Likely
CVE-2008-3854 2008-08-28 2025-04-09 - 7.8 Likely
CVE-2008-3855 2008-08-28 2025-04-09 - 4.6 Unknown
CVE-2008-3856 2008-08-28 2025-04-09 - 7.5 Likely
CVE-2008-3857 2008-08-28 2025-04-09 - 4.6 Unknown
CVE-2008-3858 2008-08-28 2025-04-09 - 4.3 Likely
CVE-2008-3960 2008-09-11 2025-04-09 - 5.0 Likely
CVE-2009-0172 2009-01-16 2025-04-09 - 5.0 Likely
CVE-2009-0173 2009-01-16 2025-04-09 - 5.0 Likely
CVE-2009-4150 2009-12-02 2025-04-09 - 4.6 Unknown
CVE-2010-3739 2010-10-05 2025-04-11 - 6.4 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm db2_universal_database by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.