Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm i2 analysts notebook 9.2.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2021-29767
IBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 could allow a remote malicious user to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force...
Ibm I2 Analysts Notebook 9.2.0
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
4.3
CVSSv2
CVE-2021-20431
IBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 does not invalidate session after logout which could allow an an malicious user to obtain sensitive information from the system. IBM X-Force ID: 196342.
Ibm I2 Analysts Notebook 9.2.0
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
9.3
CVSSv2
CVE-2020-4721
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.0
6.9
CVSSv2
CVE-2020-4550
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
6.9
CVSSv2
CVE-2020-4554
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
9.3
CVSSv2
CVE-2020-4723
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.0
6.9
CVSSv2
CVE-2020-4551
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
6.9
CVSSv2
CVE-2020-4553
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.2
9.3
CVSSv2
CVE-2020-4722
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.0
9.3
CVSSv2
CVE-2020-4724
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local malicious user to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on th...
Ibm I2 Analysts Notebook 9.2.1
Ibm I2 Analysts Notebook 9.2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »