Unknown vulnerability in IBM DB2 8.1.4 through 8.1.9 and 8.2.0 through 8.2.2 allows local users with SELECT privileges to conduct unauthorized activities and insert, update or delete table contents.
2005-06-29T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 2.1 (LOW)
AV:L/AC:L/Au:N/C:N/I:P/A:N
3.9
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ibm | db2 | 8.1.4 | Yes |
Application | ibm | db2 | 8.1.5 | Yes |
Application | ibm | db2 | 8.1.6 | Yes |
Application | ibm | db2 | 8.1.7 | Yes |
Application | ibm | db2 | 8.1.8a | Yes |
Application | ibm | db2 | 8.1.9 | Yes |
Application | ibm | db2 | 8.2.0 | Yes |
Application | ibm | db2 | 8.2.1 | Yes |
Application | ibm | db2 | 8.2.2 | Yes |