Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
i2 analysts notebook vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2021-20431
IBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 does not invalidate session after logout which could allow an an malicious user to obtain sensitive information from the system. IBM X-Force ID: 196342.
Ibm I2 Analysts Notebook 9.2.0
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
445
VMScore
CVE-2021-29767
IBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 could allow a remote malicious user to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force...
Ibm I2 Analysts Notebook 9.2.0
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
614
VMScore
CVE-2020-4550
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
614
VMScore
CVE-2020-4551
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
614
VMScore
CVE-2020-4554
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
828
VMScore
CVE-2020-4721
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.0
828
VMScore
CVE-2020-4722
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.0
828
VMScore
CVE-2020-4723
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.0
828
VMScore
CVE-2020-4724
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.0
614
VMScore
CVE-2020-4553
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »