Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus domino 7.0.2 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2007-5924
Cross-site scripting (XSS) vulnerability in the Web Server (HTTP) task in IBM Lotus Domino prior to 6.5.6 FP2, and 7.x prior to 7.0.2 FP2, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino
Ibm Lotus Domino 7.0
6.2
CVSSv2
CVE-2007-5544
IBM Lotus Notes prior to 6.5.6, and 7.x prior to 7.0.3; and Domino prior to 6.5.5 FP3, and 7.x prior to 7.0.2 FP1; uses weak permissions (Everyone:Full Control) for memory mapped files (shared memory) in IPC, which allows local users to obtain sensitive information, or inject Lot...
Ibm Lotus Notes
Ibm Lotus Domino
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino 6.5.5
9
CVSSv2
CVE-2007-3510
Buffer overflow in the IMAP service in IBM Lotus Domino prior to 6.5.6 FP2, and 7.x prior to 7.0.3, allows remote authenticated users to execute arbitrary code via a long mailbox name.
Ibm Lotus Domino 7.0
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino 6.5.6
Ibm Lotus Domino 6.5.5
6.3
CVSSv2
CVE-2007-5700
The Evaluate LotusScript method in IBM Lotus Domino prior to 7.0.3 uses an incorrect security context for @ formula commands in some circumstances, which might allow remote authenticated users to gain privileges and obtain sensitive information.
Ibm Lotus Domino 6.5.6
Ibm Lotus Domino 7.0
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino 6.5.5
2.1
CVSSv2
CVE-2007-5701
Incomplete blacklist vulnerability in the Certificate Authority (CA) in IBM Lotus Domino prior to 7.0.3 allows local users, or attackers with physical access, to obtain sensitive information (passwords) when an administrator enters a "ca activate" or "ca unlock&quo...
Ibm Lotus Domino 6.5.5
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino 6.5.6
Ibm Lotus Domino 7.0
7.8
CVSSv2
CVE-2007-1739
Heap-based buffer overflow in the LDAP server in IBM Lotus Domino prior to 6.5.6 and 7.x prior to 7.0.2 FP1 allows remote malicious users to cause a denial of service (crash) via a long, malformed DN request, which causes only the lower 16 bits of the string length to be used in ...
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino 7.0
Ibm Lotus Domino 7.0.1
7.8
CVSSv2
CVE-2008-0243
Unspecified vulnerability in Lotus Domino 7.0.2 before Fix Pack 3 allows malicious users to cause a denial of service via unknown vectors.
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino 7.0
Ibm Lotus Domino 7.0.1
9.3
CVSSv2
CVE-2007-0068
IBM Lotus Domino 7.0.x prior to 7.0.3 does not revalidate the signature on a signed scheduled agent after the agent is modified, which allows remote authenticated users to gain privileges via a modified agent in a server database.
Ibm Lotus Domino 7.0
Ibm Lotus Domino 7.0.1
Ibm Lotus Domino 7.0.2
10
CVSSv2
CVE-2007-1675
Buffer overflow in the CRAM-MD5 authentication mechanism in the IMAP server (nimap.exe) in IBM Lotus Domino prior to 6.5.6 and 7.x prior to 7.0.2 FP1 allows remote malicious users to cause a denial of service via a long username.
Ibm Lotus Domino 6.5.0
Ibm Lotus Domino 6.5.1
Ibm Lotus Domino 6.5.5
Ibm Lotus Domino 7.0
Ibm Lotus Domino 6.5.4
Ibm Lotus Domino 6.5.2
Ibm Lotus Domino 6.5.3
Ibm Lotus Domino 7.0.1
Ibm Lotus Domino 7.0.2
3 EDB exploits
4.3
CVSSv2
CVE-2006-4843
Cross-site scripting (XSS) vulnerability in the Active Content Filter feature in IBM Lotus Domino prior to 6.5.6 and 7.x prior to 7.0.2 FP1 allows remote malicious users to inject arbitrary web script or HTML via unspecified "code sequences" that bypass the protection s...
Ibm Lotus Domino 6.5.1
Ibm Lotus Domino 6.5.2
Ibm Lotus Domino 7.0
Ibm Lotus Domino 7.0.1
Ibm Lotus Domino 6.5.4
Ibm Lotus Domino 6.5.3
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino 6.5.0
Ibm Lotus Domino 6.5.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »