CVE-2010-3194
31.08.2010, 22:00
The DB2DART program in IBM DB2 9.1 before FP9, 9.5 before FP6, and 9.7 before FP2 allows attackers to bypass intended file access restrictions via unspecified vectors related to overwriting files owned by an instance owner.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | db2 | 9.1 |
ibm | db2 | 9.1:fp1 |
ibm | db2 | 9.1:fp2 |
ibm | db2 | 9.1:fp2a |
ibm | db2 | 9.1:fp3 |
ibm | db2 | 9.1:fp3a |
ibm | db2 | 9.1:fp4 |
ibm | db2 | 9.1:fp4a |
ibm | db2 | 9.1:fp5 |
ibm | db2 | 9.1:fp6 |
ibm | db2 | 9.1:fp6a |
ibm | db2 | 9.1:fp7 |
ibm | db2 | 9.1:fp7a |
ibm | db2 | 9.1:fp8 |
ibm | db2 | 9.5 |
ibm | db2 | 9.5:fp1 |
ibm | db2 | 9.5:fp2 |
ibm | db2 | 9.5:fp2a |
ibm | db2 | 9.5:fp3 |
ibm | db2 | 9.5:fp3a |
ibm | db2 | 9.5:fp3b |
ibm | db2 | 9.5:fp4 |
ibm | db2 | 9.5:fp4a |
ibm | db2 | 9.5:fp5 |
ibm | db2 | 9.7 |
ibm | db2 | 9.7:fp1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References