Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes 8.5.0.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-4825
Multiple cross-site scripting (XSS) vulnerabilities in servlet/traveler/ILNT.mobileconfig in IBM Lotus Notes Traveler prior to 8.5.3.2 allow remote malicious users to inject arbitrary web script or HTML via the (1) userId or (2) address parameter in a getClientConfigFile action.
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2012-5307
Cross-site scripting (XSS) vulnerability in servlet/traveler in IBM Lotus Notes Traveler prior to 8.5.3.3 Interim Fix 1, when Firefox is used, allows remote malicious users to inject arbitrary web script or HTML via the redirectURL parameter, a different vulnerability than CVE-20...
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.3.1
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.3.2
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2012-5308
Cross-site request forgery (CSRF) vulnerability in servlet/traveler in IBM Lotus Notes Traveler up to and including 8.5.3.3 Interim Fix 1 allows remote malicious users to hijack the authentication of arbitrary users for requests that create problem reports via a getReportProblem ...
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.3.1
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.3.3
Ibm Lotus Notes Traveler 8.5.3.2
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2012-5309
servlet/traveler in IBM Lotus Notes Traveler up to and including 8.5.3.3 Interim Fix 1 does not properly restrict invalid authentication attempts, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.3.1
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.3.3
Ibm Lotus Notes Traveler 8.5.3.2
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2012-2174
The URL handler in IBM Lotus Notes 8.x prior to 8.5.3 FP2 allows remote malicious users to execute arbitrary code via a crafted notes:// URL.
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.1.1
1 EDB exploit
NA
CVE-2011-1512
Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a malformed BIFF record in a .xls Excel spreadsheet attachment, aka SPR PRAD8E3HKR.
Ibm Lotus Notes 5.0.1
Autonomy Keyview
Ibm Lotus Notes 4.6
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.4.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 5.0.5.01
Ibm Lotus Notes 5.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 5.0.9
Ibm Lotus Notes 6.5.5.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 5.0.5.02
Ibm Lotus Notes 5.0.4a
NA
CVE-2011-1214
Stack-based buffer overflow in rtfsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted link in a .rtf attachment, aka SPR PRAD8823JQ.
Ibm Lotus Notes 5.0.1
Ibm Lotus Notes 4.6
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.4.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 5.0.5.01
Ibm Lotus Notes 5.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 5.0.9
Ibm Lotus Notes 6.5.5.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 5.0.5.02
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 6.5.5.1
NA
CVE-2011-1213
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
Ibm Lotus Notes 5.0.1
Ibm Lotus Notes 4.6
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.4.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 5.0.5.01
Ibm Lotus Notes 5.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 5.0.9
Ibm Lotus Notes 6.5.5.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 5.0.5.02
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 6.5.5.1
1 EDB exploit
NA
CVE-2011-1215
Stack-based buffer overflow in mw8sr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted link in a Microsoft Office document attachment, aka SPR PRAD8823ND.
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 7.0.2.2
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 7.0.2.3
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0.2.1
Ibm Lotus Notes 7.0
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.0.2
NA
CVE-2011-1216
Stack-based buffer overflow in assr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via crafted tag data in an Applix spreadsheet attachment, aka SPR PRAD8823A7.
Ibm Lotus Notes 5.0.1
Ibm Lotus Notes 4.6
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 7.0.4.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 5.0.5.01
Ibm Lotus Notes 5.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 5.0.9
Ibm Lotus Notes 6.5.5.2
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5
Ibm Lotus Notes 5.0.5.02
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 6.5.5.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »