CVE-2015-1922
EUVD-2015-202720.07.2015, 01:59
The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| ibm | db2 | 9.7 |
| ibm | db2 | 9.7 |
| ibm | db2 | 9.7 |
| ibm | db2 | 9.7 |
| ibm | db2 | 9.7 |
| ibm | db2 | 9.8 |
| ibm | db2 | 9.8 |
| ibm | db2 | 9.8 |
| ibm | db2 | 9.8 |
| ibm | db2 | 9.8 |
| ibm | db2 | 10.1 |
| ibm | db2 | 10.1 |
| ibm | db2 | 10.1 |
| ibm | db2 | 10.1 |
| ibm | db2 | 10.1 |
| ibm | db2 | 10.5 |
| ibm | db2 | 10.5 |
| ibm | db2 | 10.5 |
| ibm | db2 | 10.5 |
| ibm | db2 | 10.5 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References