Db2 Vulnerabilities

Security vulnerability tracking for Ibm Db2

Last updated: Feb 17, 2026
Total CVEs

4

Critical

0

With Exploits

2

Last 30 Days

0

Vulnerability Timeline

4 vulnerabilities discovered over time for Db2

Severity Distribution

Critical0
0%
High1
25%
Medium3
75%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2025-364256.5

This vulnerability allows an authenticated user to access sensitive information from IBM Db2 databases if the High Availability Disaster Recovery (HADR) feature is configured in a certain way. To exploit this, the attacker must already have valid credentials to log into the system.

ibmdb2
Theoretical
about 2 months agoFeb 17, 2026
CVE-2025-362478.2

An attacker can exploit a vulnerability in IBM Db2 to access sensitive information or overload the system by sending specially crafted XML data. This can happen if the database is configured to process XML without proper security measures in place.

ibmdb2
Exploit Available
about 2 months agoFeb 17, 2026
CVE-2025-146896.5

This vulnerability allows an authenticated user to crash the IBM Db2 database, leading to a denial of service, which means legitimate users can't access the database. It occurs due to flaws in how the database handles certain data queries involving federated objects, so only users with access can exploit it.

ibmdb2
Theoretical
about 2 months agoFeb 17, 2026
CVE-2025-138676.5

This vulnerability allows an authenticated user to crash the IBM Db2 database, leading to a denial of service, which means legitimate users cannot access the database. It occurs due to flaws in how the database handles certain special characters in queries, affecting specific versions of Db2 software.

ibmdb2
Exploit Available
about 2 months agoFeb 17, 2026

About Ibm Db2 Security

This page provides comprehensive security vulnerability tracking for Ibm Db2. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Db2 updated to the latest version
  • • Subscribe to security advisories from Ibm
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately