

Impacted is confidentiality, integrity, and availability.


Using CWE to declare the problem leads to CWE-119. The manipulation with an unknown input leads to a memory corruption vulnerability. Affected by this issue is an unknown function. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability, which was classified as critical, has been found in IBM i2 Analyst Notebook 9.2.0/9.2.1. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
