Unknown vulnerability in IBM DB2 8.1.4 through 8.1.9 and 8.2.0 through 8.2.2 allows local users with SELECT privileges to conduct unauthorized activities and insert, update or delete table contents.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Db2 | Ibm | 8.1.4 (including) | 8.1.4 (including) |
Db2 | Ibm | 8.1.5 (including) | 8.1.5 (including) |
Db2 | Ibm | 8.1.6 (including) | 8.1.6 (including) |
Db2 | Ibm | 8.1.7 (including) | 8.1.7 (including) |
Db2 | Ibm | 8.1.8a (including) | 8.1.8a (including) |
Db2 | Ibm | 8.1.9 (including) | 8.1.9 (including) |
Db2 | Ibm | 8.2.0 (including) | 8.2.0 (including) |
Db2 | Ibm | 8.2.1 (including) | 8.2.1 (including) |
Db2 | Ibm | 8.2.2 (including) | 8.2.2 (including) |