Unknown vulnerability in IBM DB2 8.1.4 up to and including 8.1.9 and 8.2.0 up to and including 8.2.2 allows local users with SELECT privileges to conduct unauthorized activities and insert, update or delete table contents.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ibm db2 8.2.2 |
||
ibm db2 8.1.4 |
||
ibm db2 8.1.5 |
||
ibm db2 8.1.6 |
||
ibm db2 8.1.7 |
||
ibm db2 8.1.8a |
||
ibm db2 8.2.0 |
||
ibm db2 8.1.9 |
||
ibm db2 8.2.1 |