IBM DB2 8 before FP18, 9.1 before FP8, and 9.5 before FP4 allows remote authenticated users to bypass intended access restrictions, and update, insert, or delete table rows, via unspecified vectors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Db2 | Ibm | 8.0-fp1 (including) | 8.0-fp1 (including) |
Db2 | Ibm | 8.0-fp10 (including) | 8.0-fp10 (including) |
Db2 | Ibm | 8.0-fp11 (including) | 8.0-fp11 (including) |
Db2 | Ibm | 8.0-fp12 (including) | 8.0-fp12 (including) |
Db2 | Ibm | 8.0-fp13 (including) | 8.0-fp13 (including) |
Db2 | Ibm | 8.0-fp14 (including) | 8.0-fp14 (including) |
Db2 | Ibm | 8.0-fp15 (including) | 8.0-fp15 (including) |
Db2 | Ibm | 8.0-fp16 (including) | 8.0-fp16 (including) |
Db2 | Ibm | 8.0-fp17 (including) | 8.0-fp17 (including) |
Db2 | Ibm | 8.0-fp2 (including) | 8.0-fp2 (including) |
Db2 | Ibm | 8.0-fp3 (including) | 8.0-fp3 (including) |
Db2 | Ibm | 8.0-fp4 (including) | 8.0-fp4 (including) |
Db2 | Ibm | 8.0-fp5 (including) | 8.0-fp5 (including) |
Db2 | Ibm | 8.0-fp6 (including) | 8.0-fp6 (including) |
Db2 | Ibm | 8.0-fp7 (including) | 8.0-fp7 (including) |
Db2 | Ibm | 8.0-fp8 (including) | 8.0-fp8 (including) |
Db2 | Ibm | 8.0-fp9 (including) | 8.0-fp9 (including) |
Db2 | Ibm | 9.1-fp1 (including) | 9.1-fp1 (including) |
Db2 | Ibm | 9.1-fp2 (including) | 9.1-fp2 (including) |
Db2 | Ibm | 9.1-fp3 (including) | 9.1-fp3 (including) |
Db2 | Ibm | 9.1-fp4 (including) | 9.1-fp4 (including) |
Db2 | Ibm | 9.1-fp5 (including) | 9.1-fp5 (including) |
Db2 | Ibm | 9.1-fp6 (including) | 9.1-fp6 (including) |
Db2 | Ibm | 9.1-fp7 (including) | 9.1-fp7 (including) |
Db2 | Ibm | 9.5-fp1 (including) | 9.5-fp1 (including) |
Db2 | Ibm | 9.5-fp2 (including) | 9.5-fp2 (including) |
Db2 | Ibm | 9.5-fp3 (including) | 9.5-fp3 (including) |