IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote malicious users to read arbitrary XML files via the (1) GET_WRAP_CFG_C or (2) GET_WRAP_CFG_C2 stored procedure.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ibm db2 9.1.0.1 |
||
ibm db2 9.1.0.2 |
||
ibm db2 9.1.0.6 |
||
ibm db2 9.1.0.7 |
||
ibm db2 9.1 |
||
ibm db2 9.1.0.5 |
||
ibm db2 9.1.0.11 |
||
ibm db2 9.1.0.3 |
||
ibm db2 9.1.0.8 |
||
ibm db2 9.1.0.4 |
||
ibm db2 9.1.0.9 |
||
ibm db2 9.1.0.10 |
||
ibm db2 9.5 |
||
ibm db2 9.5.0.1 |
||
ibm db2 9.5.0.4 |
||
ibm db2 9.5.0.5 |
||
ibm db2 9.5.0.6 |
||
ibm db2 9.5.0.3 |
||
ibm db2 9.5.0.2 |
||
ibm db2 9.5.0.7 |
||
ibm db2 9.5.0.8 |
||
ibm db2 9.5.0.9 |
||
ibm db2 9.7.0.2 |
||
ibm db2 9.7.0.3 |
||
ibm db2 9.7 |
||
ibm db2 9.7.0.1 |
||
ibm db2 9.7.0.4 |
||
ibm db2 9.7.0.5 |
||
ibm db2 9.7.0.6 |
||
ibm db2 9.8.0.4 |
||
ibm db2 9.8.0.5 |
||
ibm db2 9.8 |
||
ibm db2 9.8.0.3 |
||
ibm db2 10.1 |