CVE-2015-1883
Published Jul 20, 2015
Last updated 7 years ago
Overview
- Description
- IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read certain administrative files via crafted use of an automated-maintenance policy stored procedure.
- Source
- psirt@us.ibm.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "3D9E7D2A-42B9-4D07-A107-BBD839E59858" }, { "criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "FD27164C-7554-46E1-B755-27C74D2EC3B7" }, { "criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "F199F7B4-F273-4D45-AE08-7B5DAE6E0794" }, { "criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:express:*:*:*", "vulnerable": true, "matchCriteriaId": "ACEB3F4A-6411-4456-9B89-A43562189BD3" }, { "criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "1749B7DC-08BB-474B-BA5A-52602459C8EC" }, { "criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:advanced_enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "025FA405-0FD2-4B19-8FA4-15581085BD15" }, { "criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:advanced_workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "F425C545-39CD-483C-97A3-BE0DC3EE63DB" }, { "criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "6A6A7680-D883-414F-965B-1D6136760CA5" }, { "criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:express:*:*:*", "vulnerable": true, "matchCriteriaId": "76107CFE-EB32-4AF6-9AF9-F16238F9C671" }, { "criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "7D1225B0-DBFF-4A13-93CB-1B64AF9ACE47" }, { "criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "2ECC11D3-7D77-4823-8B34-DD76E131D74C" }, { "criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "E1D36687-32AF-43E2-97D9-FDF602F89318" }, { "criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "DD80ADF4-35D3-4534-AACD-C00D80870723" }, { "criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:express:*:*:*", "vulnerable": true, "matchCriteriaId": "8D274B00-C986-4A5D-94B2-79F4A613D951" }, { "criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "67A935CA-7AF6-4DA9-958E-DF4BC8E2B3BF" }, { "criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "A6B1A4DC-7062-4349-8D1A-3DE4B0E68FC8" }, { "criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "B3681F43-F23B-413D-B871-A40821F4988B" }, { "criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "AE645126-ECD0-40FB-B2BA-5C9EF33EBE69" }, { "criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:express:*:*:*", "vulnerable": true, "matchCriteriaId": "9AFEA656-426C-4F18-9737-8985531C7A93" }, { "criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "09B0333F-0E27-40B3-A0DC-618BEA97CBC2" } ], "operator": "OR" } ] } ]