First published: Mon Jul 20 2015(Updated: )
The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Db2 | =9.7 | |
Ibm Db2 | =9.7 | |
Ibm Db2 | =9.7 | |
Ibm Db2 | =9.7 | |
Ibm Db2 | =9.7 | |
Ibm Db2 | =9.8 | |
Ibm Db2 | =9.8 | |
Ibm Db2 | =9.8 | |
Ibm Db2 | =9.8 | |
Ibm Db2 | =9.8 | |
Ibm Db2 | =10.1 | |
Ibm Db2 | =10.1 | |
Ibm Db2 | =10.1 | |
Ibm Db2 | =10.1 | |
Ibm Db2 | =10.1 | |
Ibm Db2 | =10.5 | |
Ibm Db2 | =10.5 | |
Ibm Db2 | =10.5 | |
Ibm Db2 | =10.5 | |
Ibm Db2 | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.