Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes 9.0.0.0 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2017-1711
IBM iNotes 8.5 and 9.0 SUService can be misguided into running malicious code from a DLL masquerading as a windows DLL in the temp directory. IBM X-Force ID: 134532.
Ibm Notes 8.5.0.0
Ibm Notes 8.5.1.0
Ibm Notes 8.5.2.0
Ibm Notes 8.5.3.0
Ibm Notes 9.0.0.0
Ibm Notes 9.0.1.0
Ibm Client Application Access 1.0.1.1
Ibm Client Application Access 1.0.1.0
Ibm Client Application Access 1.0.1.2
1 Article
NA
CVE-2014-0892
IBM Notes and Domino 8.5.x prior to 8.5.3 FP6 IF3 and 9.x prior to 9.0.1 FP1 on 32-bit Linux platforms use incorrect gcc options, which makes it easier for remote malicious users to execute arbitrary code by leveraging the absence of the NX protection mechanism and placing crafte...
Ibm Lotus Domino 8.5.0
Ibm Lotus Domino 8.5.0.1
Ibm Lotus Domino 8.5.1
Ibm Lotus Domino 8.5.1.1
Ibm Lotus Domino 8.5.1.2
Ibm Lotus Domino 8.5.1.3
Ibm Lotus Domino 8.5.1.4
Ibm Lotus Domino 8.5.1.5
Ibm Lotus Domino 8.5.2.0
Ibm Lotus Domino 8.5.2.1
Ibm Lotus Domino 8.5.2.2
Ibm Lotus Domino 8.5.2.3
Ibm Lotus Domino 8.5.2.4
Ibm Lotus Domino 8.5.3.0
Ibm Lotus Domino 8.5.3.1
Ibm Lotus Domino 8.5.3.2
Ibm Lotus Domino 8.5.3.3
Ibm Lotus Domino 8.5.3.4
Ibm Lotus Domino 8.5.3.5
Ibm Lotus Domino 8.5.3.6
Ibm Lotus Domino 9.0.0.0
Ibm Lotus Domino 9.0.1.0
NA
CVE-2013-2977
Integer overflow in IBM Notes 8.5.x prior to 8.5.3 FP4 Interim Fix 1 and 9.x prior to 9.0 Interim Fix 1 on Windows, and 8.5.x prior to 8.5.3 FP5 and 9.x prior to 9.0.1 on Linux, allows remote malicious users to execute arbitrary code via a malformed PNG image in a previewed e-mai...
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.3.4
Ibm Lotus Notes 9.0.0.0
1 Github repository
NA
CVE-2013-0127
IBM Lotus Notes 8.x prior to 8.5.3 FP4 Interim Fix 1 and 9.0 before Interim Fix 1 does not block APPLET elements in HTML e-mail, which allows remote malicious users to bypass intended restrictions on Java code execution and X-Confirm-Reading-To functionality via a crafted message...
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.0.0
NA
CVE-2013-0538
Cross-site scripting (XSS) vulnerability in IBM Lotus Notes 8.x prior to 8.5.3 FP4 Interim Fix 1 and 9.0 before Interim Fix 1 allows remote malicious users to inject arbitrary web script or HTML via a SCRIPT element in an HTML e-mail message, aka SPRs JMOY95BLM6 and JMOY95BN49.
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.0.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started