The scalar-function implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote attackers to cause a denial of service or execute arbitrary code via unspecified vectors.
2015-07-20T01:59:06.017
2025-04-12T10:46:40.837
Deferred
CVSSv2: 8.0 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:C
8.0
8.5
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ibm | db2 | 9.7 | Yes |
Application | ibm | db2 | 9.7 | Yes |
Application | ibm | db2 | 9.7 | Yes |
Application | ibm | db2 | 9.7 | Yes |
Application | ibm | db2 | 9.7 | Yes |
Application | ibm | db2 | 9.8 | Yes |
Application | ibm | db2 | 9.8 | Yes |
Application | ibm | db2 | 9.8 | Yes |
Application | ibm | db2 | 9.8 | Yes |
Application | ibm | db2 | 9.8 | Yes |
Application | ibm | db2 | 10.1 | Yes |
Application | ibm | db2 | 10.1 | Yes |
Application | ibm | db2 | 10.1 | Yes |
Application | ibm | db2 | 10.1 | Yes |
Application | ibm | db2 | 10.1 | Yes |
Application | ibm | db2 | 10.5 | Yes |
Application | ibm | db2 | 10.5 | Yes |
Application | ibm | db2 | 10.5 | Yes |
Application | ibm | db2 | 10.5 | Yes |
Application | ibm | db2 | 10.5 | Yes |