Certain XML functions in IBM DB2 8.1 run with the privileges of DB2 instead of the logged-in user, which allows remote attackers to create or overwrite files via (1) XMLFileFromVarchar or (2) XMLFileFromClob, or read files via (3) XMLVarcharFromFile or (4) XMLClobFromFile.
https://exchange.xforce.ibmcloud.com/vulnerabilities/18761
http://www.securityfocus.com/bid/12170
http://www.ngssoftware.com/advisories/db205012005I.txt