CVE-2009-3472
EUVD-2009-345429.09.2009, 21:30
IBM DB2 8 before FP18, 9.1 before FP8, and 9.5 before FP4 allows remote authenticated users to bypass intended access restrictions, and update, insert, or delete table rows, via unspecified vectors.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| ibm | db2 | 8.0:fp1 |
| ibm | db2 | 8.0:fp10 |
| ibm | db2 | 8.0:fp11 |
| ibm | db2 | 8.0:fp12 |
| ibm | db2 | 8.0:fp13 |
| ibm | db2 | 8.0:fp14 |
| ibm | db2 | 8.0:fp15 |
| ibm | db2 | 8.0:fp16 |
| ibm | db2 | 8.0:fp17 |
| ibm | db2 | 8.0:fp2 |
| ibm | db2 | 8.0:fp3 |
| ibm | db2 | 8.0:fp4 |
| ibm | db2 | 8.0:fp5 |
| ibm | db2 | 8.0:fp6 |
| ibm | db2 | 8.0:fp7 |
| ibm | db2 | 8.0:fp8 |
| ibm | db2 | 8.0:fp9 |
| ibm | db2 | 9.1:fp1 |
| ibm | db2 | 9.1:fp2 |
| ibm | db2 | 9.1:fp3 |
| ibm | db2 | 9.1:fp4 |
| ibm | db2 | 9.1:fp5 |
| ibm | db2 | 9.1:fp6 |
| ibm | db2 | 9.1:fp7 |
| ibm | db2 | 9.5:fp1 |
| ibm | db2 | 9.5:fp2 |
| ibm | db2 | 9.5:fp3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References