{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T12:43:08.279","vulnerabilities":[{"cve":{"id":"CVE-2023-29267","sourceIdentifier":"psirt@us.ibm.com","published":"2024-06-12T19:15:50.020","lastModified":"2024-11-21T07:56:46.417","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5is vulnerable to a denial of service, under specific configurations, as the server may crash when using a specially crafted SQL statement by an authenticated user.  IBM X-Force ID:  287612."},{"lang":"es","value":"IBM Db2 para Linux, UNIX y Windows (incluye Db2 Connect Server) 10.5, 11.1 y 11.5 es vulnerable a una denegación de servicio, en configuraciones específicas, ya que el servidor puede fallar cuando se utiliza una declaración SQL especialmente manipulada por un usuario autenticado. ID de IBM X-Force: 287612."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-399"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:10.5:*:*:*:*:linux:*:*","matchCriteriaId":"C9AB7540-A007-4554-A0E6-F75FDECB41FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:10.5:*:*:*:*:unix:*:*","matchCriteriaId":"E48B9069-E7BD-480F-90B3-3791D5D2E79E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:10.5:*:*:*:*:windows:*:*","matchCriteriaId":"9A04E067-F41C-494B-B59A-92B9FA001122"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:11.1:*:*:*:*:linux:*:*","matchCriteriaId":"A2ED357E-CBC6-454F-9B9E-E98E9A139376"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:11.1:*:*:*:*:unix:*:*","matchCriteriaId":"33D92200-08A1-42F4-98B8-52584342C18B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:11.1:*:*:*:*:windows:*:*","matchCriteriaId":"A49F8B60-EAC8-46B6-9F48-6C877E41D615"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:11.5:*:*:*:*:linux:*:*","matchCriteriaId":"42CB728E-ECA8-40DE-83E7-8AF390AA61FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:11.5:*:*:*:*:unix:*:*","matchCriteriaId":"9105BCAD-F2C6-4568-B497-D72424753B58"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:11.5:*:*:*:*:windows:*:*","matchCriteriaId":"ADF7E611-0330-437D-9535-B710EC2FDA00"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/287612","source":"psirt@us.ibm.com","tags":["VDB Entry"]},{"url":"https://www.ibm.com/support/pages/node/7156851","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/287612","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry"]},{"url":"https://security.netapp.com/advisory/ntap-20240828-0004/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.ibm.com/support/pages/node/7156851","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}