Total vulnerabilities in the database
IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP2 provides an INSTALL_JAR (aka sqlj.install_jar) procedure, which allows remote authenticated users to create or overwrite arbitrary files via unspecified calls.
Software | From | Fixed in |
---|---|---|
ibm / db2 | 8.0-fp11 | 8.0-fp11.x |
ibm / db2 | 8.0-fp10 | 8.0-fp10.x |
ibm / db2 | 9.1-fp4 | 9.1-fp4.x |
ibm / db2 | 9.1-fp1 | 9.1-fp1.x |
ibm / db2 | 9.5-fp1 | 9.5-fp1.x |
ibm / db2 | 8.0-fp16 | 8.0-fp16.x |
ibm / db2 | 9.1-fp3 | 9.1-fp3.x |
ibm / db2 | 9.1-fp3a | 9.1-fp3a.x |
ibm / db2 | 8.0-fp14 | 8.0-fp14.x |
ibm / db2 | 8.0-fp1 | 8.0-fp1.x |
ibm / db2 | 9.1-fp2 | 9.1-fp2.x |
ibm / db2 | 9.1-fp4a | 9.1-fp4a.x |
ibm / db2 | 8.0-fp13 | 8.0-fp13.x |
ibm / db2 | 8.0-fp12 | 8.0-fp12.x |
ibm / db2 | 8.0-fp15 | 8.0-fp15.x |