Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm notes 8.5.2 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2018-1435
IBM Notes 8.5 and 9.0 is vulnerable to a DLL hijacking attack. A remote attacker could trick a user to double click a malicious executable in an attacker-controlled directory, which could result in code execution. IBM X-Force ID: 139563.
Ibm Notes 8.5
Ibm Notes 8.5.1
Ibm Notes 8.5.2
Ibm Notes 8.5.3
Ibm Notes 9.0
Ibm Notes 9.0.1
Ibm Notes 8.5.3.6
Ibm Notes 8.5.1.5
Ibm Notes 8.5.2.4
Ibm Notes 9.0.1.9
Ibm Notes 8.5.0.2
7.8
CVSSv3
CVE-2018-1437
IBM Notes 8.5 and 9.0 could allow an malicious user to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the appli...
Ibm Notes 8.5
Ibm Notes 8.5.1
Ibm Notes 8.5.2
Ibm Notes 8.5.3
Ibm Notes 9.0
Ibm Notes 9.0.1
Ibm Notes 8.5.3.6
Ibm Notes 8.5.1.5
Ibm Notes 8.5.2.4
Ibm Notes 9.0.1.9
Ibm Notes 8.5.0.2
7
CVSSv3
CVE-2013-0522
The Notes Client Single Logon feature in IBM Notes 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.2, 8.5.3, and 9.0 on Windows allows local users to discover passwords via vectors involving an unspecified operating system communication mechanism for password transmission between Windows and ...
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.5.2
Ibm Lotus Notes 9.0
NA
CVE-2011-1213
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
Ibm Lotus Notes 5.0.1
Ibm Lotus Notes 4.6
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.4.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 5.0.5.01
Ibm Lotus Notes 5.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 5.0.9
Ibm Lotus Notes 6.5.5.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 5.0.5.02
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 6.5.5.1
1 EDB exploit
NA
CVE-2011-1214
Stack-based buffer overflow in rtfsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted link in a .rtf attachment, aka SPR PRAD8823JQ.
Ibm Lotus Notes 5.0.1
Ibm Lotus Notes 4.6
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.4.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 5.0.5.01
Ibm Lotus Notes 5.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 5.0.9
Ibm Lotus Notes 6.5.5.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 5.0.5.02
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 6.5.5.1
NA
CVE-2011-1216
Stack-based buffer overflow in assr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via crafted tag data in an Applix spreadsheet attachment, aka SPR PRAD8823A7.
Ibm Lotus Notes 5.0.1
Ibm Lotus Notes 4.6
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.4.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 5.0.5.01
Ibm Lotus Notes 5.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 5.0.9
Ibm Lotus Notes 6.5.5.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 5.0.5.02
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 6.5.5.1
NA
CVE-2011-1217
Buffer overflow in kpprzrdr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted .prz attachment. NOTE: some of these details are obtained from third party information.
Ibm Lotus Notes 5.0.1
Ibm Lotus Notes 4.6
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.4.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 5.0.5.01
Ibm Lotus Notes 5.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 5.0.9
Ibm Lotus Notes 6.5.5.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 5.0.5.02
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 6.5.5.1
NA
CVE-2011-1512
Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a malformed BIFF record in a .xls Excel spreadsheet attachment, aka SPR PRAD8E3HKR.
Ibm Lotus Notes 5.0.1
Autonomy Keyview
Ibm Lotus Notes 4.6
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.4.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 5.0.5.01
Ibm Lotus Notes 5.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 5.0.9
Ibm Lotus Notes 6.5.5.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 5.0.5.02
Ibm Lotus Notes 5.0.4a
NA
CVE-2011-1218
Buffer overflow in kvarcve.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted .zip attachment, aka SPR PRAD8E3NSP. NOTE: some of these details are obtained from third party information.
Ibm Lotus Notes 5.0.1
Autonomy Keyview
Ibm Lotus Notes 4.6
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.4.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 5.0.5.01
Ibm Lotus Notes 5.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 5.0.9
Ibm Lotus Notes 6.5.5.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 5.0.5.02
Ibm Lotus Notes 5.0.4a
NA
CVE-2011-1215
Stack-based buffer overflow in mw8sr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted link in a Microsoft Office document attachment, aka SPR PRAD8823ND.
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 7.0.2.2
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 7.0.2.3
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0.2.1
Ibm Lotus Notes 7.0
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.0.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »