|
199741
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a remote attacker to execute arbitrary code on the system, caused by a memory corruption error. By persuading a victim to open a specially-crafte…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4287
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
199742
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a remote attacker to execute arbitrary code on the system, caused by a memory corruption error. By persuading a victim to open a specially-crafte…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4285
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
199743
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4266
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
199744
|
7.3 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4265
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
199745
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4264
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
199746
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4263
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
199747
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4262
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
199748
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4261
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
199749
|
6.5 |
MEDIUM
Network
|
ibm
|
sterling_file_gateway
|
IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 could allow an authenticated user could manipulate cookie information and remove or add modules from the cookie to access functionality not authorize…
|
CWE-276
Incorrect Default Permissions
|
CVE-2020-4259
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
199750
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4258
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|