|
198321
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a remote attacker to execute arbitrary code on the system, caused by a memory corruption error. By persuading a victim to open a specially-crafte…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4285
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
198322
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4266
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
198323
|
7.3 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4265
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
198324
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4264
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
198325
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4263
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
198326
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4262
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
198327
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4261
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
198328
|
6.5 |
MEDIUM
Network
|
ibm
|
sterling_file_gateway
|
IBM Sterling File Gateway 2.2.0.0 through 6.0.3.1 could allow an authenticated user could manipulate cookie information and remove or add modules from the cookie to access functionality not authorize…
|
CWE-276
Incorrect Default Permissions
|
CVE-2020-4259
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
198329
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4258
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
198330
|
7.8 |
HIGH
Local
|
ibm
|
i2_analysts_notebook
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file,…
|
CWE-787
Out-of-bounds Write
|
CVE-2020-4257
|
2024-11-21 14:32 |
2020-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|