Product
Multiple vulnerabilities in IBM DB2 allow a remote, anonymous, authenticated, or local attacker to manipulate files, bypass security measures, disclose confidential information, cause a denial-of-service condition, execute arbitrary code with elevated privileges, misrepresent information, and execute arbitrary code.