Описание
IBM DB2 and DB2 Connect 9.7 through FP8, 9.8 through FP5, 10.1 through FP2, and 10.5 through FP1 allow remote authenticated users to execute DML statements by leveraging EXPLAIN authority.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:9.8:*:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:db2_connect:9.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:db2_connect:9.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:db2_connect:9.8:*:*:*:*:*:*:*
cpe:2.3:a:ibm:db2_connect:10.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:db2_connect:10.5:*:*:*:*:*:*:*
EPSS
Процентиль: 76%
0.00952
Низкий
4.6 Medium
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
больше 3 лет назад
IBM DB2 and DB2 Connect 9.7 through FP8, 9.8 through FP5, 10.1 through FP2, and 10.5 through FP1 allow remote authenticated users to execute DML statements by leveraging EXPLAIN authority.
EPSS
Процентиль: 76%
0.00952
Низкий
4.6 Medium
CVSS2
Дефекты
CWE-264