Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm notes 8.5.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-1608
Stack-based buffer overflow in IBM Lotus Notes 8.5 and 8.5fp1, and possibly other versions, allows remote malicious users to execute arbitrary code via unknown attack vectors, as demonstrated by the vd_ln module in VulnDisco 9.0. NOTE: as of 20100222, this disclosure has no actio...
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.1
7.8
CVSSv3
CVE-2018-1437
IBM Notes 8.5 and 9.0 could allow an malicious user to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the appli...
Ibm Notes 8.5
Ibm Notes 8.5.1
Ibm Notes 9.0.1
Ibm Notes 8.5.2
Ibm Notes 8.5.2.4
Ibm Notes 8.5.3
Ibm Notes 8.5.3.6
Ibm Notes 8.5.0.2
Ibm Notes 8.5.1.5
Ibm Notes 9.0
Ibm Notes 9.0.1.9
7.8
CVSSv3
CVE-2018-1435
IBM Notes 8.5 and 9.0 is vulnerable to a DLL hijacking attack. A remote attacker could trick a user to double click a malicious executable in an attacker-controlled directory, which could result in code execution. IBM X-Force ID: 139563.
Ibm Notes 8.5.1.5
Ibm Notes 8.5.2.4
Ibm Notes 8.5.3.6
Ibm Notes 9.0
Ibm Notes 9.0.1
Ibm Notes 9.0.1.9
Ibm Notes 8.5
Ibm Notes 8.5.0.2
Ibm Notes 8.5.1
Ibm Notes 8.5.2
Ibm Notes 8.5.3
7
CVSSv3
CVE-2013-0522
The Notes Client Single Logon feature in IBM Notes 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.2, 8.5.3, and 9.0 on Windows allows local users to discover passwords via vectors involving an unspecified operating system communication mechanism for password transmission between Windows and ...
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.2
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 9.0
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.5
NA
CVE-2013-0536
ntmulti.exe in the Multi User Profile Cleanup service in IBM Notes 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.2, 8.5.3 before FP5, and 9.0 before IF2 allows local users to gain privileges via vectors that arrange for code to be executed during the next login session of a different user, ...
Ibm Lotus Notes 8.0
Ibm Lotus Notes Traveler 9.0
Ibm Lotus Inotes 8.5.2.0
Ibm Lotus Inotes 8.5.3.0
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2
NA
CVE-2012-4846
IBM Lotus Notes 8.5.x prior to 8.5.3 FP3 does not include the HTTPOnly flag in a Set-Cookie header for a web-application cookie, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to this cookie, aka SPRs JMAS7TRNLN and ...
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3
NA
CVE-2012-6349
Buffer overflow in the .mdb parser in Autonomy KeyView IDOL, as used in IBM Notes 8.5.x prior to 8.5.3 FP4, allows remote malicious users to execute arbitrary code via a crafted file, aka SPR KLYH92XL3W.
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.2.1
Autonomy Keyview Idol -
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.4
NA
CVE-2013-2977
Integer overflow in IBM Notes 8.5.x prior to 8.5.3 FP4 Interim Fix 1 and 9.x prior to 9.0 Interim Fix 1 on Windows, and 8.5.x prior to 8.5.3 FP5 and 9.x prior to 9.0.1 on Linux, allows remote malicious users to execute arbitrary code via a malformed PNG image in a previewed e-mai...
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.3.4
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 9.0.0.0
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.1
1 Github repository
NA
CVE-2012-2174
The URL handler in IBM Lotus Notes 8.x prior to 8.5.3 FP2 allows remote malicious users to execute arbitrary code via a crafted notes:// URL.
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.2.2
1 EDB exploit
NA
CVE-2013-0127
IBM Lotus Notes 8.x prior to 8.5.3 FP4 Interim Fix 1 and 9.0 before Interim Fix 1 does not block APPLET elements in HTML e-mail, which allows remote malicious users to bypass intended restrictions on Java code execution and X-Confirm-Reading-To functionality via a crafted message...
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 9.0.0.0
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.2.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »