6.1 Medium
AI Score
Confidence
Low
3.5 Low
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
52.7%
The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
www-01.ibm.com/support/docview.wss?uid=swg1IT08523
www-01.ibm.com/support/docview.wss?uid=swg1IT08524
www-01.ibm.com/support/docview.wss?uid=swg1IT08525
www-01.ibm.com/support/docview.wss?uid=swg1IT08526
www-01.ibm.com/support/docview.wss?uid=swg21959650
www.securityfocus.com/bid/75911
www.securitytracker.com/id/1032879