Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes 4.6 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2001-1504
Lotus Notes R5 Client 4.6 allows remote malicious users to execute arbitrary commands via a Lotus Notes object with code in an event, which is automatically executed when the user processes the e-mail message.
Ibm Lotus Notes 4.6
Ibm Lotus Notes 5.0
9.3
CVSSv2
CVE-2011-1214
Stack-based buffer overflow in rtfsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted link in a .rtf attachment, aka SPR PRAD8823JQ.
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.6a.01
Ibm Lotus Notes 5.0.6
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0.2c
Ibm Lotus Notes 5.0.1a
Ibm Lotus Notes 5.0a
Ibm Lotus Notes 4.6
Ibm Lotus Notes 4.2.2
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 7.0.4.1
Ibm Lotus Notes 7.0.4.2
9.3
CVSSv2
CVE-2011-1218
Buffer overflow in kvarcve.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted .zip attachment, aka SPR PRAD8E3NSP. NOTE: some of these details are obtained from third party information.
Ibm Lotus Notes 7.0.2
Ibm Lotus Notes 7.0.1
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 5.0.8
Ibm Lotus Notes 5.0.7a
Ibm Lotus Notes 5.0.7
Ibm Lotus Notes 5.0.4
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 5.0.1c
Ibm Lotus Notes 5.02
Ibm Lotus Notes 4.5
Ibm Lotus Notes 3.0.0.2
Ibm Lotus Notes 3.0.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.2.4
9.3
CVSSv2
CVE-2011-1512
Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a malformed BIFF record in a .xls Excel spreadsheet attachment, aka SPR PRAD8E3HKR.
Ibm Lotus Notes 7.0.1
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 5.0.7a
Ibm Lotus Notes 5.0.7
Ibm Lotus Notes 5.0.4
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 5.0.1c
Ibm Lotus Notes 5.02
Ibm Lotus Notes 4.5
Ibm Lotus Notes 3.0.0.2
Ibm Lotus Notes 3.0.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 7.0.2.2
9.3
CVSSv2
CVE-2011-1213
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 7.0
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.7
Ibm Lotus Notes 5.0.6a.01
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 5.0.3
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.5.6
Ibm Lotus Notes 8.0
Ibm Lotus Notes 7.0.3
Ibm Lotus Notes 6.5.5
Ibm Lotus Notes 6.5.4
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.0.5
Ibm Lotus Notes 6.0.4
Ibm Lotus Notes 5.0.9a
1 EDB exploit
9.3
CVSSv2
CVE-2011-1216
Stack-based buffer overflow in assr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via crafted tag data in an Applix spreadsheet attachment, aka SPR PRAD8823A7.
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.5.6
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.6
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0.2c
Ibm Lotus Notes 5.0a
Ibm Lotus Notes 5.0
Ibm Lotus Notes 4.2.2
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 7.0.4.1
Ibm Lotus Notes 7.0.4.2
Ibm Lotus Notes 6.5.5.2
9.3
CVSSv2
CVE-2011-1217
Buffer overflow in kpprzrdr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted .prz attachment. NOTE: some of these details are obtained from third party information.
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.6a.01
Ibm Lotus Notes 5.0.6
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0.2c
Ibm Lotus Notes 5.0.1a
Ibm Lotus Notes 5.0a
Ibm Lotus Notes 4.6
Ibm Lotus Notes 4.2.2
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 7.0.4.1
Ibm Lotus Notes 7.0.4.2
7.5
CVSSv2
CVE-2002-0037
Lotus Domino Servers 5.x, 4.6x, and 4.5x allows malicious users to bypass the intended Reader and Author access list for a document's object via a Notes API call (NSFDbReadObject) that directly accesses the object.
Ibm Lotus Domino Server 4.6
Ibm Lotus Domino Server 4.5
Ibm Lotus Domino Server 5
5
CVSSv2
CVE-1999-0729
Buffer overflow in Lotus Notes LDAP (NLDAP) allows an malicious user to conduct a denial of service through the ldap_search request.
Ibm Lotus Domino Server 4.6
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started