The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IT08523 - Patch, Vendor Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IT08524 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IT08525 - Vendor Advisory | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg1IT08526 - | |
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21959650 - | |
References | () http://www.securityfocus.com/bid/75911 - | |
References | () http://www.securitytracker.com/id/1032879 - |
Information
Published : 2015-07-20 01:59
Updated : 2024-11-21 02:26
NVD link : CVE-2015-1922
Mitre link : CVE-2015-1922
CVE.ORG link : CVE-2015-1922
JSON object : View
Products Affected
ibm
- db2
CWE
CWE-284
Improper Access Control