cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-39049,https://securityvulnerability.io/vulnerability/CVE-2021-39049,Stack-Based Buffer Overflow in IBM i2 Analyst's Notebook Affects Multiple Versions,"IBM i2 Analyst's Notebook versions 9.2.0, 9.2.1, and 9.2.2 are susceptible to a stack-based buffer overflow due to insufficient bounds checking. This vulnerability allows local attackers to exploit the overflow, potentially gaining lower-level privileges within the affected software environment, compromising system integrity. For further details and mitigation strategies, you can refer to IBM's official documentation.",IBM,I2 Analyst's Notebook,5.3,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-12-13T19:15:00.000Z,0 CVE-2021-39050,https://securityvulnerability.io/vulnerability/CVE-2021-39050,Stack-Based Buffer Overflow in IBM i2 Analyst's Notebook,"IBM i2 Analyst's Notebook versions 9.2.0, 9.2.1, and 9.2.2 are susceptible to a stack-based buffer overflow due to improper bounds checking. This flaw allows a local attacker to exploit the vulnerability, potentially leading to unauthorized privilege escalation and the execution of arbitrary code. It is crucial for users to implement security measures and updates to mitigate these risks.",IBM,I2 Analyst's Notebook,5.3,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2021-12-13T19:15:00.000Z,0 CVE-2021-20431,https://securityvulnerability.io/vulnerability/CVE-2021-20431,,"IBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 does not invalidate session after logout which could allow an an attacker to obtain sensitive information from the system. IBM X-Force ID: 196342.",IBM,I2 Analyst's Notebook Premium,4.3,MEDIUM,0.0017999999690800905,false,,false,false,false,,,false,false,,2021-07-26T12:15:00.000Z,0 CVE-2021-29767,https://securityvulnerability.io/vulnerability/CVE-2021-29767,,"IBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 202681.",IBM,I2 Analyst's Notebook Premium,5.3,MEDIUM,0.0010300000431016088,false,,false,false,false,,,false,false,,2021-07-26T12:15:00.000Z,0 CVE-2020-4723,https://securityvulnerability.io/vulnerability/CVE-2020-4723,,"IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 187873.",IBM,I2 Analyst Notebook,7.8,HIGH,0.0014199999859556556,false,,false,false,false,,,false,false,,2020-10-29T16:15:00.000Z,0 CVE-2020-4721,https://securityvulnerability.io/vulnerability/CVE-2020-4721,,"IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 187868.",IBM,I2 Analyst Notebook,7.8,HIGH,0.0014199999859556556,false,,false,false,false,,,false,false,,2020-10-29T16:15:00.000Z,0 CVE-2020-4722,https://securityvulnerability.io/vulnerability/CVE-2020-4722,,"IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 187870.",IBM,I2 Analyst Notebook,7.8,HIGH,0.0014199999859556556,false,,false,false,false,,,false,false,,2020-10-29T16:15:00.000Z,0 CVE-2020-4724,https://securityvulnerability.io/vulnerability/CVE-2020-4724,,"IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.",IBM,I2 Analyst Notebook,7.8,HIGH,0.0014199999859556556,false,,false,false,false,,,false,false,,2020-10-29T16:15:00.000Z,0 CVE-2020-4550,https://securityvulnerability.io/vulnerability/CVE-2020-4550,,"IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 183318.",IBM,I2 Analyst Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-08-03T13:15:00.000Z,0 CVE-2020-4549,https://securityvulnerability.io/vulnerability/CVE-2020-4549,,"IBM i2 Analyst Notebook 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 183317.",IBM,I2 Analyst Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-08-03T13:15:00.000Z,0 CVE-2020-4552,https://securityvulnerability.io/vulnerability/CVE-2020-4552,,"IBM i2 Analyst Notebook 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 183320.",IBM,I2 Analyst Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-08-03T13:15:00.000Z,0 CVE-2020-4553,https://securityvulnerability.io/vulnerability/CVE-2020-4553,,"IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 183321.",IBM,I2 Analyst Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-08-03T13:15:00.000Z,0 CVE-2020-4554,https://securityvulnerability.io/vulnerability/CVE-2020-4554,,"IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 183322.",IBM,I2 Analyst Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-08-03T13:15:00.000Z,0 CVE-2020-4551,https://securityvulnerability.io/vulnerability/CVE-2020-4551,,"IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 183319.",IBM,I2 Analyst Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-08-03T13:15:00.000Z,0 CVE-2020-4467,https://securityvulnerability.io/vulnerability/CVE-2020-4467,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a remote attacker to execute arbitrary code on the system, caused by memory corruption. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to execute arbitrary code on the system with the privileges of the victim or cause the application to crash. IBM X-Force ID: 181721.",IBM,I2 Analysts Notebook,7.8,HIGH,0.032340001314878464,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0 CVE-2020-4468,https://securityvulnerability.io/vulnerability/CVE-2020-4468,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a remote attacker to execute arbitrary code on the system, caused by memory corruption. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to execute arbitrary code on the system with the privileges of the victim or cause the application to crash. IBM X-Force ID: 181723.",IBM,I2 Analysts Notebook,7.8,HIGH,0.032340001314878464,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0 CVE-2020-4257,https://securityvulnerability.io/vulnerability/CVE-2020-4257,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 175635.",IBM,I2 Analysts Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0 CVE-2020-4258,https://securityvulnerability.io/vulnerability/CVE-2020-4258,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 175637.",IBM,I2 Analysts Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0 CVE-2020-4261,https://securityvulnerability.io/vulnerability/CVE-2020-4261,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 175644.",IBM,I2 Analysts Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0 CVE-2020-4262,https://securityvulnerability.io/vulnerability/CVE-2020-4262,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 175645.",IBM,I2 Analysts Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0 CVE-2020-4263,https://securityvulnerability.io/vulnerability/CVE-2020-4263,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 175646.",IBM,I2 Analysts Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0 CVE-2020-4264,https://securityvulnerability.io/vulnerability/CVE-2020-4264,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 175647.",IBM,I2 Analysts Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0 CVE-2020-4265,https://securityvulnerability.io/vulnerability/CVE-2020-4265,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 175648.",IBM,I2 Analysts Notebook,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0 CVE-2020-4266,https://securityvulnerability.io/vulnerability/CVE-2020-4266,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 175649.",IBM,I2 Analysts Notebook,7.8,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0 CVE-2020-4285,https://securityvulnerability.io/vulnerability/CVE-2020-4285,,"IBM i2 Intelligent Analyis Platform 9.2.1 could allow a remote attacker to execute arbitrary code on the system, caused by a memory corruption error. By persuading a victim to open a specially-crafted document, a remote attacker could exploit this vulnerability to execute arbitrary code on the system with the privileges of the victim or cause the application to crash. IBM X-Force ID: 176266",IBM,I2 Analysts Notebook,7.8,HIGH,0.032340001314878464,false,,false,false,false,,,false,false,,2020-05-14T16:15:00.000Z,0