Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes 8.5 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-1608
Stack-based buffer overflow in IBM Lotus Notes 8.5 and 8.5fp1, and possibly other versions, allows remote malicious users to execute arbitrary code via unknown attack vectors, as demonstrated by the vd_ln module in VulnDisco 9.0. NOTE: as of 20100222, this disclosure has no actio...
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.1
10
CVSSv2
CVE-2009-3032
Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 up to and including 5.0.13, and other products, allows context-dependent malicious users to execute ar...
Ibm Lotus Notes 8.5
Symantec Mail Security 7.5.3.25
Symantec Mail Security 7.5.4.29
Symantec Mail Security 8.0.2
Symantec Brightmail Gateway 8.0
Symantec Data Loss Prevention Detection Servers 8.1.1
Symantec Data Loss Prevention Detection Servers 10.0
Symantec Mail Security 5.0.13
Symantec Mail Security 6.0.6
Symantec Mail Security 7.5.7
Symantec Mail Security 7.5.8
Symantec Mail Security 5.0.1.182
Symantec Mail Security 5.0.1.189
Symantec Mail Security 5.0.11
Symantec Mail Security 5.0.12
Symantec Mail Security 7.5.5.32
Symantec Mail Security 7.5.6
Symantec Mail Security 5.0.0
Symantec Mail Security 5.0.1.181
Symantec Data Loss Prevention Detection Servers 9.0.1
Symantec Data Loss Prevention Endpoint Agents 9.0.1
Symantec Data Loss Prevention Endpoint Agents 10.0
9.3
CVSSv2
CVE-2012-6277
Multiple unspecified vulnerabilities in Autonomy KeyView IDOL prior to 10.16, as used in Symantec Mail Security for Microsoft Exchange prior to 6.5.8, Symantec Mail Security for Domino prior to 8.1.1, Symantec Messaging Gateway prior to 10.0.1, Symantec Data Loss Prevention (DLP)...
Ibm Domino
Ibm Notes
Symantec Data Loss Prevention Endpoint
Symantec Data Loss Prevention Enforce\\/detection Servers
Symantec Mail Security 6.5.7
Symantec Mail Security
Symantec Messaging Gateway
Hp Autonomy Keyview Idol
9.3
CVSSv2
CVE-2012-6349
Buffer overflow in the .mdb parser in Autonomy KeyView IDOL, as used in IBM Notes 8.5.x prior to 8.5.3 FP4, allows remote malicious users to execute arbitrary code via a crafted file, aka SPR KLYH92XL3W.
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.2.1
Autonomy Keyview Idol -
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.4
9.3
CVSSv2
CVE-2012-4820
Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and previous versions, Java 6.0.1 SR3 and previous versions, Java 6 SR11 and previous versions, Java 5 SR14 and previous versions, and Java 142 SR13 FP13 and previous versions; as used in IBM Rational Host On-Demand...
Ibm Java
Ibm Lotus Domino 8.0
Ibm Lotus Domino 8.0.2.3
Ibm Lotus Domino 8.5.0
Ibm Lotus Domino 8.5.1.5
Ibm Lotus Domino 8.5.2.1
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.3
Ibm Rational Change 5.2
Ibm Rational Host On-demand 1.6.0.12
Ibm Rational Host On-demand 11.0.3.0
9.3
CVSSv2
CVE-2012-4821
Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and previous versions, Java 6.0.1 SR3 and previous versions, Java 6 SR11 and previous versions, Java 5 SR14 and previous versions, and Java 142 SR13 FP13 and previous versions; as used in IBM Rational Hos...
Ibm Lotus Domino 8.0.1
Ibm Lotus Domino 8.0.2
Ibm Lotus Domino 8.0.2.1
Ibm Lotus Domino 8.0.2.2
Ibm Lotus Domino 8.5.2.3
Ibm Lotus Domino 8.5.2.4
Ibm Lotus Domino 8.5.3.0
Ibm Lotus Domino 8.5.3.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.4
Ibm Lotus Notes Sametime 8.0.80407
Ibm Lotus Notes Sametime 8.0.80822
Ibm Lotus Notes Sametime 8.5.1.20100709-1631
Ibm Lotus Notes Traveler 8.5.3.2
Ibm Lotus Notes Traveler 8.5.3.3
Ibm Rational Change 4.7
Ibm Rational Host On-demand 11.0.6.0
Ibm Rational Host On-demand 11.0.6.1
9.3
CVSSv2
CVE-2012-4822
Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and previous versions, Java 6.0.1 SR3 and previous versions, Java 6 SR11 and previous versions, Java 5 SR14 and previous versions, and Java 142 SR13 FP13 and previous versions; as used in IBM Rational Hos...
Ibm Java
Ibm Lotus Domino 8.5.1.4
Ibm Lotus Domino 8.5.1.5
Ibm Lotus Domino 8.5.2.0
Ibm Lotus Domino 8.5.2.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.3
Ibm Rational Host On-demand 11.0.3.0
Ibm Rational Host On-demand 11.0.4.0
Ibm Rational Host On-demand 11.0.5.0
Ibm Rational Host On-demand 11.0.5.1
9.3
CVSSv2
CVE-2012-4823
Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and previous versions, Java 6.0.1 SR3 and previous versions, Java 6 SR11 and previous versions, Java 5 SR14 and previous versions, and Java 142 SR13 FP13 and previous versions; as used in IBM Rational Host On-Demand...
Ibm Lotus Domino 8.0.2.4
Ibm Lotus Domino 8.5.0
Ibm Lotus Domino 8.5.0.1
Ibm Lotus Domino 8.5.1
Ibm Lotus Domino 8.5.3.2
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Rational Change 5.1
Ibm Rational Change 5.2
Ibm Rational Change 5.3
Ibm Rational Host On-demand 1.6.0.12
Ibm Rational Host On-demand 8.0.8.0
Ibm Smart Analytics System 5600 Software 9.7
9.3
CVSSv2
CVE-2012-2174
The URL handler in IBM Lotus Notes 8.x prior to 8.5.3 FP2 allows remote malicious users to execute arbitrary code via a crafted notes:// URL.
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.2.2
1 EDB exploit
9.3
CVSSv2
CVE-2011-1213
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 7.0
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.7
Ibm Lotus Notes 5.0.6a.01
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 5.0.3
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.5.6
Ibm Lotus Notes 8.0
Ibm Lotus Notes 7.0.3
Ibm Lotus Notes 6.5.5
Ibm Lotus Notes 6.5.4
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.0.5
Ibm Lotus Notes 6.0.4
Ibm Lotus Notes 5.0.9a
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »