Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm notes 8.5.2 vulnerabilities and exploits
(subscribe to this query)
169
VMScore
CVE-2013-0522
The Notes Client Single Logon feature in IBM Notes 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.2, 8.5.3, and 9.0 on Windows allows local users to discover passwords via vectors involving an unspecified operating system communication mechanism for password transmission between Windows and ...
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.2
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 9.0
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.5
606
VMScore
CVE-2018-1435
IBM Notes 8.5 and 9.0 is vulnerable to a DLL hijacking attack. A remote attacker could trick a user to double click a malicious executable in an attacker-controlled directory, which could result in code execution. IBM X-Force ID: 139563.
Ibm Notes 8.5.1.5
Ibm Notes 8.5.2.4
Ibm Notes 8.5.3.6
Ibm Notes 9.0
Ibm Notes 9.0.1
Ibm Notes 9.0.1.9
Ibm Notes 8.5
Ibm Notes 8.5.0.2
Ibm Notes 8.5.1
Ibm Notes 8.5.2
Ibm Notes 8.5.3
828
VMScore
CVE-2018-1437
IBM Notes 8.5 and 9.0 could allow an malicious user to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the appli...
Ibm Notes 8.5
Ibm Notes 8.5.1
Ibm Notes 9.0.1
Ibm Notes 8.5.2
Ibm Notes 8.5.2.4
Ibm Notes 8.5.3
Ibm Notes 8.5.3.6
Ibm Notes 8.5.0.2
Ibm Notes 8.5.1.5
Ibm Notes 9.0
Ibm Notes 9.0.1.9
725
VMScore
CVE-2015-0179
Notes System Diagnostic (NSD) in IBM Domino 8.5.x prior to 8.5.3 FP6 IF6 and 9.x prior to 9.0.1 FP3 IF1 allows local users to obtain the System privilege via unspecified vectors, aka SPR TCHL9SST8V.
Ibm Domino 8.5.1
Ibm Domino 8.5.2
Ibm Domino 8.5.3
Ibm Domino 9.0.1
Ibm Domino 8.5.0
1 EDB exploit
641
VMScore
CVE-2013-0536
ntmulti.exe in the Multi User Profile Cleanup service in IBM Notes 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.2, 8.5.3 before FP5, and 9.0 before IF2 allows local users to gain privileges via vectors that arrange for code to be executed during the next login session of a different user, ...
Ibm Lotus Notes 8.0
Ibm Lotus Notes Traveler 9.0
Ibm Lotus Inotes 8.5.2.0
Ibm Lotus Inotes 8.5.3.0
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2
169
VMScore
CVE-2013-0534
The Connect client in IBM Sametime 8.5.1, 8.5.1.1, 8.5.1.2, 8.5.2, and 8.5.2.1, as used in the Lotus Notes client and separately, might allow local users to obtain sensitive information by leveraging the persistence of cleartext password strings within process memory.
Ibm Sametime 8.5.1.1
Ibm Sametime 8.5.1
Ibm Lotus Sametime 8.5.2.1
Ibm Lotus Sametime 8.5.1.2
Ibm Lotus Sametime 8.5.1.1
Ibm Lotus Sametime 8.5.2
Ibm Sametime 8.5.2.1
Ibm Lotus Sametime 8.5.1
Ibm Sametime 8.5.1.2
Ibm Sametime 8.5.2
694
VMScore
CVE-2011-1393
Unspecified vulnerability in the authentication functionality in the server in IBM Lotus Domino 8.x prior to 8.5.2 FP4 allows remote malicious users to cause a denial of service (daemon crash) via a crafted Notes RPC packet.
Ibm Lotus Domino 8.0.2
Ibm Lotus Domino 8.0.2.1
Ibm Lotus Domino 8.5.0
Ibm Lotus Domino 8.5.1
Ibm Lotus Domino 8.0.2.2
Ibm Lotus Domino 8.0.2.3
Ibm Lotus Domino 8.5.1.1
Ibm Lotus Domino 8.5.1.2
Ibm Lotus Domino 8.0.2.4
Ibm Lotus Domino 8.0.2.5
Ibm Lotus Domino 8.5.1.3
Ibm Lotus Domino 8.5.1.4
Ibm Lotus Domino 8.0
Ibm Lotus Domino 8.0.1
Ibm Lotus Domino 8.0.2.6
Ibm Lotus Domino 8.0.5
Ibm Lotus Domino 8.5.1.5
Ibm Lotus Domino
935
VMScore
CVE-2011-1213
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 7.0
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.7
Ibm Lotus Notes 5.0.6a.01
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 5.0.3
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.5.6
Ibm Lotus Notes 8.0
Ibm Lotus Notes 7.0.3
Ibm Lotus Notes 6.5.5
Ibm Lotus Notes 6.5.4
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.0.5
Ibm Lotus Notes 6.0.4
Ibm Lotus Notes 5.0.9a
1 EDB exploit
828
VMScore
CVE-2011-1216
Stack-based buffer overflow in assr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via crafted tag data in an Applix spreadsheet attachment, aka SPR PRAD8823A7.
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.5.6
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.6
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0.2c
Ibm Lotus Notes 5.0a
Ibm Lotus Notes 5.0
Ibm Lotus Notes 4.2.2
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 7.0.4.1
Ibm Lotus Notes 7.0.4.2
Ibm Lotus Notes 6.5.5.2
828
VMScore
CVE-2011-1217
Buffer overflow in kpprzrdr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted .prz attachment. NOTE: some of these details are obtained from third party information.
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.6a.01
Ibm Lotus Notes 5.0.6
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0.2c
Ibm Lotus Notes 5.0.1a
Ibm Lotus Notes 5.0a
Ibm Lotus Notes 4.6
Ibm Lotus Notes 4.2.2
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 7.0.4.1
Ibm Lotus Notes 7.0.4.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »