Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes 8.5.1.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-1608
Stack-based buffer overflow in IBM Lotus Notes 8.5 and 8.5fp1, and possibly other versions, allows remote malicious users to execute arbitrary code via unknown attack vectors, as demonstrated by the vd_ln module in VulnDisco 9.0. NOTE: as of 20100222, this disclosure has no actio...
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.1
NA
CVE-2012-4825
Multiple cross-site scripting (XSS) vulnerabilities in servlet/traveler/ILNT.mobileconfig in IBM Lotus Notes Traveler prior to 8.5.3.2 allow remote malicious users to inject arbitrary web script or HTML via the (1) userId or (2) address parameter in a getClientConfigFile action.
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2010-4544
Cross-site scripting (XSS) vulnerability in the servlet in IBM Lotus Notes Traveler prior to 8.5.1.3 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2010-4550
IBM Lotus Notes Traveler prior to 8.5.1.3 allows remote malicious users to cause a denial of service (sync failure) via a malformed document.
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2010-4547
IBM Lotus Notes Traveler prior to 8.5.1.3, when a multidomain environment is used, does not properly apply policy documents to mobile users from a different Domino domain than the Traveler server, which allows remote authenticated users to bypass intended access restrictions by u...
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2010-4549
IBM Lotus Notes Traveler prior to 8.5.1.3 on the Nokia s60 device successfully performs a Replace Data operation for a prohibited application, which allows remote authenticated users to bypass intended access restrictions via this operation.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2012-4846
IBM Lotus Notes 8.5.x prior to 8.5.3 FP3 does not include the HTTPOnly flag in a Set-Cookie header for a web-application cookie, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to this cookie, aka SPRs JMAS7TRNLN and ...
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.1.5
NA
CVE-2011-0912
Argument injection vulnerability in IBM Lotus Notes 8.0.x prior to 8.0.2 FP6 and 8.5.x prior to 8.5.1 FP5 allows remote malicious users to execute arbitrary code via a cai:// URL containing a --launcher.library option that specifies a UNC share pathname for a DLL file, aka SPR PR...
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.0
NA
CVE-2012-6349
Buffer overflow in the .mdb parser in Autonomy KeyView IDOL, as used in IBM Notes 8.5.x prior to 8.5.3 FP4, allows remote malicious users to execute arbitrary code via a crafted file, aka SPR KLYH92XL3W.
Ibm Lotus Notes 8.5.2.1
Autonomy Keyview Idol -
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.1.5
NA
CVE-2012-5307
Cross-site scripting (XSS) vulnerability in servlet/traveler in IBM Lotus Notes Traveler prior to 8.5.3.3 Interim Fix 1, when Firefox is used, allows remote malicious users to inject arbitrary web script or HTML via the redirectURL parameter, a different vulnerability than CVE-20...
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.3.1
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.3.2
Ibm Lotus Notes Traveler 8.5.1.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »