Vulnerabilities > IBM > High

DATE CVE VULNERABILITY TITLE RISK
2020-08-03 CVE-2020-4554 Out-of-bounds Write vulnerability in IBM I2 Analysts Notebook 9.2.1/9.2.2
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption.
local
low complexity
ibm CWE-787
7.8
2020-08-03 CVE-2020-4553 Out-of-bounds Write vulnerability in IBM I2 Analysts Notebook 9.2.1/9.2.2
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption.
local
low complexity
ibm CWE-787
7.8
2020-08-03 CVE-2020-4552 Out-of-bounds Write vulnerability in IBM I2 Analysts Notebook 9.2.1
IBM i2 Analyst Notebook 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption.
local
low complexity
ibm CWE-787
7.8
2020-08-03 CVE-2020-4551 Out-of-bounds Write vulnerability in IBM I2 Analysts Notebook 9.2.1/9.2.2
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption.
local
low complexity
ibm CWE-787
7.8
2020-08-03 CVE-2020-4550 Out-of-bounds Write vulnerability in IBM I2 Analysts Notebook 9.2.1/9.2.2
IBM i2 Analyst Notebook 9.2.1 and 9.2.2 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption.
local
low complexity
ibm CWE-787
7.8
2020-08-03 CVE-2020-4549 Out-of-bounds Write vulnerability in IBM I2 Analysts Notebook 9.2.1
IBM i2 Analyst Notebook 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption.
local
low complexity
ibm CWE-787
7.8
2020-08-03 CVE-2020-4534 Unspecified vulnerability in IBM Websphere Application Server
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local authenticated attacker to gain elevated privileges on the system, caused by improper handling of UNC paths.
local
low complexity
ibm
8.8
2020-07-30 CVE-2020-4185 Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Security Guardium 10.5/10.6/11.1
IBM Security Guardium 10.5, 10.6, and 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
network
low complexity
ibm CWE-327
7.5
2020-07-29 CVE-2020-4574 Weak Password Requirements vulnerability in IBM Security KEY Lifecycle Manager 3.0.1/4.0
IBM Tivoli Key Lifecycle Manager does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.
network
low complexity
ibm CWE-521
7.5
2020-07-29 CVE-2020-4463 XXE vulnerability in IBM Maximo Asset Management 7.6.0.1/7.6.0.2
IBM Maximo Asset Management 7.6.0.1 and 7.6.0.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data.
network
low complexity
ibm CWE-611
8.2