Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
i2 analysts notebook vulnerabilities and exploits
(subscribe to this query)
409
VMScore
CVE-2021-39049
IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214439.
Ibm I2 Analysts Notebook
409
VMScore
CVE-2021-39050
IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214440.
Ibm I2 Analysts Notebook
828
VMScore
CVE-2020-4721
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.0
Ibm I2 Analysts Notebook 9.2.1
828
VMScore
CVE-2020-4722
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.0
Ibm I2 Analysts Notebook 9.2.1
828
VMScore
CVE-2020-4723
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.0
Ibm I2 Analysts Notebook 9.2.1
828
VMScore
CVE-2020-4724
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.0
Ibm I2 Analysts Notebook 9.2.1
614
VMScore
CVE-2020-4549
IBM i2 Analyst Notebook 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. ...
Ibm I2 Analysts Notebook 9.2.1
614
VMScore
CVE-2020-4550
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
614
VMScore
CVE-2020-4551
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
614
VMScore
CVE-2020-4552
IBM i2 Analyst Notebook 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. ...
Ibm I2 Analysts Notebook 9.2.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »