The scalar-function implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Db2 | Ibm | 10.1 | 10.1 |
Db2 | Ibm | 10.1 | 10.1 |
Db2 | Ibm | 10.5 | 10.5 |
Db2 | Ibm | 9.8 | 9.8 |
Db2 | Ibm | 9.7 | 9.7 |
Db2 | Ibm | 10.5 | 10.5 |
Db2 | Ibm | 9.7 | 9.7 |
Db2 | Ibm | 9.7 | 9.7 |
Db2 | Ibm | 10.1 | 10.1 |
Db2 | Ibm | 10.5 | 10.5 |
Db2 | Ibm | 9.8 | 9.8 |
Db2 | Ibm | 9.7 | 9.7 |
Db2 | Ibm | 9.8 | 9.8 |
Db2 | Ibm | 9.8 | 9.8 |
Db2 | Ibm | 10.5 | 10.5 |
Db2 | Ibm | 10.1 | 10.1 |
Db2 | Ibm | 9.7 | 9.7 |
Db2 | Ibm | 10.5 | 10.5 |
Db2 | Ibm | 10.1 | 10.1 |
Db2 | Ibm | 9.8 | 9.8 |