Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes 7.0.2 vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2007-4309
IBM Lotus Notes 5.x up to and including 7.0.2 allows user-assisted remote authenticated administrators to obtain a cleartext notes.id password by setting the notes.ini (1) KFM_ShowEntropy and (2) Debug_Outfile debug variables, a different vulnerability than CVE-2005-2696.
Ibm Lotus Notes 5.0
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.2
Ibm Lotus Notes 6.0
Ibm Lotus Notes 7.0.1
9.3
CVSSv2
CVE-2008-1217
Unspecified vulnerability in nlnotes.dll in the client in IBM Lotus Notes 6.5, 7.0.x prior to 7.0.2 CCH, and 8.0.x prior to 8.0.1 allows remote malicious users to execute arbitrary code via a crafted attachment in an e-mail message sent over SMTP, a variant of CVE-2007-6706.
Ibm Lotus Notes 6.5
Ibm Lotus Notes 7.0.2
Ibm Lotus Notes 8.0.0
9.3
CVSSv2
CVE-2007-5399
Multiple heap-based buffer overflows in emlsr.dll in the EML reader in Autonomy (formerly Verity) KeyView 10.3.0.0, as used by IBM Lotus Notes, allow remote malicious users to execute arbitrary code via a long (1) To, (2) Cc, (3) Bcc, (4) From, (5) Date, (6) Subject, (7) Priority...
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.5
Ibm Lotus Notes 7.0.3
Autonomy Keyview 10.3.0.0
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.2
9.3
CVSSv2
CVE-2008-1101
Buffer overflow in kvdocve.dll in the KeyView document viewing engine in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes 7.0.2 and 7.0.3, allows remote malicious users to execute arbitrary code via a long pathname, as demonstrated by a long SRC attribute of an IMG ...
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.5
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.2
Ibm Lotus Notes 7.0.3
Autonomy Keyview 10.3.0.0
Autonomy Keyview 2.0.0.2
9.3
CVSSv2
CVE-2008-0066
Multiple buffer overflows in htmsr.dll in the HTML speed reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes 7.0.2 and 7.0.3, allow remote malicious users to execute arbitrary code via an HTML document with (1) "large chunks of data," or a long URL ...
Autonomy Keyview
Ibm Lotus Notes 7.0.2
Ibm Lotus Notes 7.0.3
9.3
CVSSv2
CVE-2011-1215
Stack-based buffer overflow in mw8sr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted link in a Microsoft Office document attachment, aka SPR PRAD8823ND.
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 7.0.1
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 7.0.4.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
5
CVSSv2
CVE-2006-5835
The Notes Remote Procedure Call (NRPC) protocol in IBM Lotus Notes Domino prior to 6.5.5 FP2 and 7.x prior to 7.0.2 does not require authentication to perform user lookups, which allows remote malicious users to obtain the user ID file.
Ibm Lotus Notes 5.0.3
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.5.3
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.5.4
Ibm Lotus Notes 6.5.5
Ibm Lotus Notes 6.0.4
Ibm Lotus Notes 6.0.5
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.1
Ibm Lotus Notes 5.0.12
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.5.1
2 Nmap scripts
9.3
CVSSv2
CVE-2011-1214
Stack-based buffer overflow in rtfsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted link in a .rtf attachment, aka SPR PRAD8823JQ.
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.6a.01
Ibm Lotus Notes 5.0.6
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0.2c
Ibm Lotus Notes 5.0.1a
Ibm Lotus Notes 5.0a
Ibm Lotus Notes 4.6
Ibm Lotus Notes 4.2.2
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 7.0.4.1
Ibm Lotus Notes 7.0.4.2
9.3
CVSSv2
CVE-2011-1218
Buffer overflow in kvarcve.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted .zip attachment, aka SPR PRAD8E3NSP. NOTE: some of these details are obtained from third party information.
Ibm Lotus Notes 7.0.2
Ibm Lotus Notes 7.0.1
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 5.0.8
Ibm Lotus Notes 5.0.7a
Ibm Lotus Notes 5.0.7
Ibm Lotus Notes 5.0.4
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 5.0.1c
Ibm Lotus Notes 5.02
Ibm Lotus Notes 4.5
Ibm Lotus Notes 3.0.0.2
Ibm Lotus Notes 3.0.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.2.4
9.3
CVSSv2
CVE-2011-1512
Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a malformed BIFF record in a .xls Excel spreadsheet attachment, aka SPR PRAD8E3HKR.
Ibm Lotus Notes 7.0.1
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 5.0.7a
Ibm Lotus Notes 5.0.7
Ibm Lotus Notes 5.0.4
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 5.0.1c
Ibm Lotus Notes 5.02
Ibm Lotus Notes 4.5
Ibm Lotus Notes 3.0.0.2
Ibm Lotus Notes 3.0.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 7.0.2.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »