Ibm

I2 Analysts Notebook

29 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 13.12.2021 19:15:08
  • Last modified 21.11.2024 06:18:29

IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214440.

  • EPSS 0.06%
  • Published 13.12.2021 19:15:07
  • Last modified 21.11.2024 06:18:29

IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214439.

  • EPSS 0.18%
  • Published 26.07.2021 12:15:08
  • Last modified 21.11.2024 06:01:46

IBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the ...

  • EPSS 0.16%
  • Published 26.07.2021 12:15:08
  • Last modified 21.11.2024 05:46:35

IBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 does not invalidate session after logout which could allow an an attacker to obtain sensitive information from the system. IBM X-Force ID: 196342.

  • EPSS 0.19%
  • Published 29.10.2020 16:15:15
  • Last modified 21.11.2024 05:33:10

IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to exec...

  • EPSS 0.19%
  • Published 29.10.2020 16:15:15
  • Last modified 21.11.2024 05:33:10

IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to exec...

  • EPSS 0.22%
  • Published 29.10.2020 16:15:15
  • Last modified 21.11.2024 05:33:10

IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to exec...

  • EPSS 0.22%
  • Published 29.10.2020 16:15:14
  • Last modified 21.11.2024 05:33:10

IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to exec...

  • EPSS 0.07%
  • Published 03.08.2020 13:15:11
  • Last modified 21.11.2024 05:32:53

IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to exec...

  • EPSS 0.07%
  • Published 03.08.2020 13:15:11
  • Last modified 21.11.2024 05:32:53

IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to exec...