Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm i2 analysts notebook 9.2.2 vulnerabilities and exploits
(subscribe to this query)
409
VMScore
CVE-2021-39049
IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214439.
Ibm I2 Analysts Notebook
409
VMScore
CVE-2021-39050
IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214440.
Ibm I2 Analysts Notebook
614
VMScore
CVE-2020-4550
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
614
VMScore
CVE-2020-4551
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
614
VMScore
CVE-2020-4553
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
614
VMScore
CVE-2020-4554
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started