CVE-2015-1922
Published Jul 20, 2015
Last updated 6 years ago
Overview
- Description
- The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
- Source
- psirt@us.ibm.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-284
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "3D9E7D2A-42B9-4D07-A107-BBD839E59858" }, { "criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "FD27164C-7554-46E1-B755-27C74D2EC3B7" }, { "criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "F199F7B4-F273-4D45-AE08-7B5DAE6E0794" }, { "criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:express:*:*:*", "vulnerable": true, "matchCriteriaId": "ACEB3F4A-6411-4456-9B89-A43562189BD3" }, { "criteria": "cpe:2.3:a:ibm:db2:9.7:*:*:*:workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "1749B7DC-08BB-474B-BA5A-52602459C8EC" }, { "criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:advanced_enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "025FA405-0FD2-4B19-8FA4-15581085BD15" }, { "criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:advanced_workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "F425C545-39CD-483C-97A3-BE0DC3EE63DB" }, { "criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "6A6A7680-D883-414F-965B-1D6136760CA5" }, { "criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:express:*:*:*", "vulnerable": true, "matchCriteriaId": "76107CFE-EB32-4AF6-9AF9-F16238F9C671" }, { "criteria": "cpe:2.3:a:ibm:db2:9.8:*:*:*:workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "7D1225B0-DBFF-4A13-93CB-1B64AF9ACE47" }, { "criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "2ECC11D3-7D77-4823-8B34-DD76E131D74C" }, { "criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "E1D36687-32AF-43E2-97D9-FDF602F89318" }, { "criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "DD80ADF4-35D3-4534-AACD-C00D80870723" }, { "criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:express:*:*:*", "vulnerable": true, "matchCriteriaId": "8D274B00-C986-4A5D-94B2-79F4A613D951" }, { "criteria": "cpe:2.3:a:ibm:db2:10.1:*:*:*:workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "67A935CA-7AF6-4DA9-958E-DF4BC8E2B3BF" }, { "criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "A6B1A4DC-7062-4349-8D1A-3DE4B0E68FC8" }, { "criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "B3681F43-F23B-413D-B871-A40821F4988B" }, { "criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "AE645126-ECD0-40FB-B2BA-5C9EF33EBE69" }, { "criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:express:*:*:*", "vulnerable": true, "matchCriteriaId": "9AFEA656-426C-4F18-9737-8985531C7A93" }, { "criteria": "cpe:2.3:a:ibm:db2:10.5:*:*:*:workgroup:*:*:*", "vulnerable": true, "matchCriteriaId": "09B0333F-0E27-40B3-A0DC-618BEA97CBC2" } ], "operator": "OR" } ] } ]