Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm notes 8.5.3 vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2018-1435
IBM Notes 8.5 and 9.0 is vulnerable to a DLL hijacking attack. A remote attacker could trick a user to double click a malicious executable in an attacker-controlled directory, which could result in code execution. IBM X-Force ID: 139563.
Ibm Notes 8.5.1.5
Ibm Notes 8.5.2.4
Ibm Notes 8.5.3.6
Ibm Notes 9.0
Ibm Notes 9.0.1
Ibm Notes 9.0.1.9
Ibm Notes 8.5
Ibm Notes 8.5.0.2
Ibm Notes 8.5.1
Ibm Notes 8.5.2
Ibm Notes 8.5.3
7.8
CVSSv3
CVE-2018-1437
IBM Notes 8.5 and 9.0 could allow an malicious user to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the appli...
Ibm Notes 8.5
Ibm Notes 8.5.1
Ibm Notes 9.0.1
Ibm Notes 8.5.2
Ibm Notes 8.5.2.4
Ibm Notes 8.5.3
Ibm Notes 8.5.3.6
Ibm Notes 8.5.0.2
Ibm Notes 8.5.1.5
Ibm Notes 9.0
Ibm Notes 9.0.1.9
NA
CVE-2012-4824
Open redirect vulnerability in servlet/traveler in IBM Lotus Notes Traveler 8.5.3 prior to 8.5.3.3 Interim Fix 1 allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirectURL parameter.
Ibm Lotus Notes Traveler 8.5.3.1
Ibm Lotus Notes Traveler 8.5.3.2
Ibm Lotus Notes Traveler 8.5.3.3
Ibm Lotus Notes Traveler 8.5.3
7
CVSSv3
CVE-2013-0522
The Notes Client Single Logon feature in IBM Notes 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.2, 8.5.3, and 9.0 on Windows allows local users to discover passwords via vectors involving an unspecified operating system communication mechanism for password transmission between Windows and ...
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.2
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 9.0
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.5
NA
CVE-2012-4825
Multiple cross-site scripting (XSS) vulnerabilities in servlet/traveler/ILNT.mobileconfig in IBM Lotus Notes Traveler prior to 8.5.3.2 allow remote malicious users to inject arbitrary web script or HTML via the (1) userId or (2) address parameter in a getClientConfigFile action.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.1.3
NA
CVE-2012-4846
IBM Lotus Notes 8.5.x prior to 8.5.3 FP3 does not include the HTTPOnly flag in a Set-Cookie header for a web-application cookie, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to this cookie, aka SPRs JMAS7TRNLN and ...
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3
NA
CVE-2012-5307
Cross-site scripting (XSS) vulnerability in servlet/traveler in IBM Lotus Notes Traveler prior to 8.5.3.3 Interim Fix 1, when Firefox is used, allows remote malicious users to inject arbitrary web script or HTML via the redirectURL parameter, a different vulnerability than CVE-20...
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.3.1
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.3.2
NA
CVE-2012-5308
Cross-site request forgery (CSRF) vulnerability in servlet/traveler in IBM Lotus Notes Traveler up to and including 8.5.3.3 Interim Fix 1 allows remote malicious users to hijack the authentication of arbitrary users for requests that create problem reports via a getReportProblem ...
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.3.3
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.3.1
Ibm Lotus Notes Traveler 8.5.3.2
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.1.2
NA
CVE-2012-5309
servlet/traveler in IBM Lotus Notes Traveler up to and including 8.5.3.3 Interim Fix 1 does not properly restrict invalid authentication attempts, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.3.2
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.3.3
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.3.1
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2012-6349
Buffer overflow in the .mdb parser in Autonomy KeyView IDOL, as used in IBM Notes 8.5.x prior to 8.5.3 FP4, allows remote malicious users to execute arbitrary code via a crafted file, aka SPR KLYH92XL3W.
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.2.1
Autonomy Keyview Idol -
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »