IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: ibm
Published: 2020-10-29T15:50:34.071505Z
Updated: 2024-09-16T17:27:43.332Z
Reserved: 2019-12-30T00:00:00
Link: CVE-2020-4724
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-10-29T16:15:15.227
Modified: 2024-11-21T05:33:10.580
Link: CVE-2020-4724
Redhat
No data.