Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm i2 analysts notebook vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2021-39049
IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214439.
Ibm I2 Analysts Notebook
4.6
CVSSv2
CVE-2021-39050
IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214440.
Ibm I2 Analysts Notebook
6.9
CVSSv2
CVE-2020-4257
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on ...
Ibm I2 Analysts Notebook 9.2.1
6.9
CVSSv2
CVE-2020-4258
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on ...
Ibm I2 Analysts Notebook 9.2.1
6.9
CVSSv2
CVE-2020-4261
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on ...
Ibm I2 Analysts Notebook 9.2.1
6.9
CVSSv2
CVE-2020-4262
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on ...
Ibm I2 Analysts Notebook 9.2.1
6.9
CVSSv2
CVE-2020-4263
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on ...
Ibm I2 Analysts Notebook 9.2.1
6.9
CVSSv2
CVE-2020-4264
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on ...
Ibm I2 Analysts Notebook 9.2.1
6.9
CVSSv2
CVE-2020-4265
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on ...
Ibm I2 Analysts Notebook 9.2.1
6.9
CVSSv2
CVE-2020-4266
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on ...
Ibm I2 Analysts Notebook 9.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »