|
197431
|
9.8 |
CRITICAL
Network
|
ibm
|
security_secret_server
|
IBM Security Verify Access 10.7 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external componen…
|
CWE-798
Use of Hard-coded Credentials
|
CVE-2020-4459
|
2024-11-21 14:32 |
2020-08-5 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
197432
|
4.3 |
MEDIUM
Network
|
ibm
|
rational_rhapsody_design_manager engineering_test_management
|
IBM Jazz Foundation and IBM Engineering products could allow an authenticated user to send a specially crafted HTTP GET request to read attachments on the server that they should not have access to. …
|
NVD-CWE-noinfo
|
CVE-2020-4410
|
2024-11-21 14:32 |
2020-08-5 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
197433
|
5.4 |
MEDIUM
Network
|
ibm
|
engineering_test_management
|
IBM Jazz Foundation and IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended fu…
|
CWE-79
Cross-site Scripting
|
CVE-2020-4396
|
2024-11-21 14:32 |
2020-08-5 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
197434
|
6.1 |
MEDIUM
Network
|
ibm
|
financial_transaction_manager
|
IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionalit…
|
CWE-79
Cross-site Scripting
|
CVE-2020-4560
|
2024-11-21 14:32 |
2020-08-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
197435
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, a…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4554
|
2024-11-21 14:32 |
2020-08-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
197436
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, a…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4553
|
2024-11-21 14:32 |
2020-08-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
197437
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Analyst Notebook 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4552
|
2024-11-21 14:32 |
2020-08-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
197438
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, a…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4551
|
2024-11-21 14:32 |
2020-08-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
197439
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, a…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4550
|
2024-11-21 14:32 |
2020-08-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
197440
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Analyst Notebook 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4549
|
2024-11-21 14:32 |
2020-08-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|