Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm inotes vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2013-0589
IBM iNotes prior to 8.5.3 Fix Pack 6 and 9.x prior to 9.0.1 allows remote malicious users to bypass the remote image filtering mechanism and obtain sensitive information via a crafted e-mail message. IBM X-Force ID: 83371.
Ibm Inotes 9.0.0.0
Ibm Inotes 8.5.3.0
Ibm Inotes 8.5.2.0
Ibm Inotes 8.0.0.0
Ibm Inotes 8.5.1.0
Ibm Inotes 8.0.2.0
Ibm Inotes 8.5.0.0
Ibm Inotes 8.0.1.0
5.8
CVSSv2
CVE-2013-0594
Open redirect vulnerability in IBM iNotes prior to 8.5.3 Fix Pack 6 and 9.x prior to 9.0.1 allows remote malicious users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. IBM X-Force ID: 83383.
Ibm Inotes 8.0.1.0
Ibm Inotes 8.0.0.0
Ibm Inotes 9.0.0.0
Ibm Inotes 8.5.3.0
Ibm Inotes 8.5.1.0
Ibm Inotes 8.0.2.0
Ibm Inotes 8.5.2.0
Ibm Inotes 8.5.0.0
3.5
CVSSv2
CVE-2013-0592
Cross-site scripting (XSS) vulnerability in IBM iNotes prior to 8.5.3 Fix Pack 6 and 9.x prior to 9.0.1 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors. IBM X-Force ID: 83815.
Ibm Inotes 8.0.2.0
Ibm Inotes 8.0.1.0
Ibm Inotes 8.0.0.0
Ibm Inotes 9.0.0.0
Ibm Inotes 8.5.2.0
Ibm Inotes 8.5.0.0
Ibm Inotes 8.5.3.0
Ibm Inotes 8.5.1.0
3.5
CVSSv2
CVE-2016-0282
Cross-site scripting (XSS) vulnerability in IBM iNotes prior to 8.5.3 FP6 IF2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, aka SPR KLYHAAHNUS.
Ibm Lotus Inotes 8.5.2.1
Ibm Lotus Inotes 8.5.2.2
Ibm Lotus Inotes 8.5.3.4
Ibm Lotus Inotes 8.5.3.5
Ibm Lotus Inotes 8.5.1.0
Ibm Lotus Inotes 8.5.1.1
Ibm Lotus Inotes 8.5.1.2
Ibm Lotus Inotes 8.5.2.3
Ibm Lotus Inotes 8.5.2.4
Ibm Lotus Inotes 8.5.3.6
Ibm Lotus Inotes 8.5.0.0
Ibm Lotus Inotes 8.5.1.3
Ibm Lotus Inotes 8.5.1.4
Ibm Lotus Inotes 8.5.3.0
Ibm Lotus Inotes 8.5.3.1
Ibm Lotus Inotes 8.5.0.1
Ibm Lotus Inotes 8.5.1.5
Ibm Lotus Inotes 8.5.2.0
Ibm Lotus Inotes 8.5.3.2
Ibm Lotus Inotes 8.5.3.3
1.5
CVSSv2
CVE-2013-0525
Multiple cross-site scripting (XSS) vulnerabilities in IBM iNotes 8.5.x allow local users to inject arbitrary web script or HTML via a shared mail file, aka SPR DKEN8PDNTX.
Ibm Lotus Inotes 8.5.1.5
Ibm Lotus Inotes 8.5.1.4
Ibm Lotus Inotes 8.5.0.0
Ibm Lotus Inotes 8.5.3.2
Ibm Lotus Inotes 8.5.3.0
Ibm Lotus Inotes 8.5.1.3
Ibm Lotus Inotes 8.5.1.2
Ibm Lotus Inotes 8.5.0.1
Ibm Lotus Inotes 8.5.2.3
Ibm Lotus Inotes 8.5.2.1
Ibm Lotus Inotes 8.5.2.0
Ibm Lotus Inotes 8.5.2.2
Ibm Lotus Inotes 8.5.3.1
Ibm Lotus Inotes 8.5.1.1
Ibm Lotus Inotes 8.5.1.0
4.3
CVSSv2
CVE-2012-5943
Cross-site scripting (XSS) vulnerability in IBM iNotes 8.5.x prior to 8.5.3 FP4 allows user-assisted remote malicious users to inject arbitrary web script or HTML via vectors involving mail, aka SPR JDOE8ZZS9.
Ibm Lotus Inotes 8.5.1.4
Ibm Lotus Inotes 8.5.2.1
Ibm Lotus Inotes 8.5.0.0
Ibm Lotus Inotes 8.5.3.2
Ibm Lotus Inotes 8.5.3.1
Ibm Lotus Inotes 8.5.3.0
Ibm Lotus Inotes 8.5.1.5
Ibm Lotus Inotes 8.5.1.2
Ibm Lotus Inotes 8.5.0.1
Ibm Lotus Inotes 8.5.2.0
Ibm Lotus Inotes 8.5.1.1
Ibm Lotus Inotes 8.5.2.3
Ibm Lotus Inotes 8.5.2.2
Ibm Lotus Inotes 8.5.1.0
Ibm Lotus Inotes 8.5.1.3
9.3
CVSSv2
CVE-2012-2175
Buffer overflow in the Attachment_Times method in a certain ActiveX control in dwa85W.dll in IBM Lotus iNotes 8.5.x prior to 8.5.3 FP2 allows remote malicious users to execute arbitrary code via a long argument.
Ibm Lotus Inotes 8.5.1.1
Ibm Lotus Inotes 8.5.1.2
Ibm Lotus Inotes 8.5.2.3
Ibm Lotus Inotes 8.5.3.0
Ibm Lotus Inotes 8.5.1.3
Ibm Lotus Inotes 8.5.1.4
Ibm Lotus Inotes 8.5.3.1
Ibm Lotus Inotes 8.5.0.0
Ibm Lotus Inotes 8.5.1.5
Ibm Lotus Inotes 8.5.2.0
Ibm Lotus Inotes 8.5.0.1
Ibm Lotus Inotes 8.5.1.0
Ibm Lotus Inotes 8.5.2.1
Ibm Lotus Inotes 8.5.2.2
1 EDB exploit
3.5
CVSSv2
CVE-2016-5880
IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Ibm Domino 8.5.1.0
Ibm Domino 8.5.2.1
Ibm Domino 8.5.2.2
Ibm Domino 8.5.3.4
Ibm Domino 8.5.3.5
Ibm Domino 8.5.3.6
Ibm Domino 9.0.1.5
Ibm Domino 9.0.1.6
Ibm Inotes 8.5.2.0
Ibm Inotes 8.5.2.1
Ibm Inotes 8.5.3.4
Ibm Inotes 8.5.3.5
Ibm Inotes 8.5.3.6
Ibm Inotes 9.0.1.5
Ibm Inotes 9.0.1.6
Ibm Domino 8.5.1.3
Ibm Domino 8.5.1.4
Ibm Domino 8.5.3.0
Ibm Domino 8.5.3.1
Ibm Domino 9.0.1.1
Ibm Domino 9.0.1.2
Ibm Inotes 8.5.1.2
4.3
CVSSv2
CVE-2016-6113
IBM Verse is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Ibm Domino 8.5.1.4
Ibm Domino 8.5.1.5
Ibm Domino 8.5.3.1
Ibm Domino 8.5.3.2
Ibm Domino 9.0.1.1
Ibm Domino 9.0.1.2
Ibm Domino 9.0.1.3
Ibm Inotes 8.5.1.3
Ibm Inotes 8.5.1.4
Ibm Inotes 8.5.3.1
Ibm Inotes 8.5.3.2
Ibm Inotes 9.0.1.2
Ibm Inotes 9.0.1.3
Ibm Domino 8.5.1.0
Ibm Domino 8.5.1.1
Ibm Domino 8.5.2.2
Ibm Domino 8.5.2.3
Ibm Domino 8.5.3.5
Ibm Domino 8.5.3.6
Ibm Domino 9.0.1.6
Ibm Inotes 8.5.1.0
Ibm Inotes 8.5.2.1
4.3
CVSSv2
CVE-2016-5882
IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
Ibm Domino 8.5.2.1
Ibm Domino 8.5.2.2
Ibm Domino 8.5.3.4
Ibm Domino 8.5.3.5
Ibm Domino 9.0.1.4
Ibm Domino 9.0.1.5
Ibm Inotes 8.5.2.0
Ibm Inotes 8.5.2.1
Ibm Inotes 8.5.3.4
Ibm Inotes 8.5.3.5
Ibm Inotes 9.0.1.4
Ibm Inotes 9.0.1.5
Ibm Domino 8.5.1.2
Ibm Domino 8.5.1.3
Ibm Domino 8.5.3.0
Ibm Domino 8.5.3.1
Ibm Domino 9.0.1.0
Ibm Domino 9.0.1.1
Ibm Inotes 8.5.1.1
Ibm Inotes 8.5.1.2
Ibm Inotes 8.5.1.3
Ibm Inotes 8.5.3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »