Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm notes 8.5.0.0 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2010-4548
IBM Lotus Notes Traveler prior to 8.5.1.2 allows remote authenticated users to cause a denial of service (daemon crash) by accepting a meeting invitation with an iNotes client and then accepting this meeting invitation with an iPhone client.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
4
CVSSv2
CVE-2010-4546
IBM Lotus Notes Traveler prior to 8.5.1.2 does not reject an attachment download request for an e-mail message with a Prevent Copy attribute, which allows remote authenticated users to bypass intended access restrictions via this request.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
4
CVSSv2
CVE-2010-4551
IBM Lotus Notes Traveler prior to 8.5.1.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by omitting the Internet ID field in the person document, and then using an Apple device to (1) accept or (2) decline an invitation...
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
3.5
CVSSv2
CVE-2010-4547
IBM Lotus Notes Traveler prior to 8.5.1.3, when a multidomain environment is used, does not properly apply policy documents to mobile users from a different Domino domain than the Traveler server, which allows remote authenticated users to bypass intended access restrictions by u...
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
4.3
CVSSv2
CVE-2010-4544
Cross-site scripting (XSS) vulnerability in the servlet in IBM Lotus Notes Traveler prior to 8.5.1.3 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
5
CVSSv2
CVE-2010-4550
IBM Lotus Notes Traveler prior to 8.5.1.3 allows remote malicious users to cause a denial of service (sync failure) via a malformed document.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
4.3
CVSSv2
CVE-2012-4825
Multiple cross-site scripting (XSS) vulnerabilities in servlet/traveler/ILNT.mobileconfig in IBM Lotus Notes Traveler prior to 8.5.3.2 allow remote malicious users to inject arbitrary web script or HTML via the (1) userId or (2) address parameter in a getClientConfigFile action.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.1.3
9.3
CVSSv2
CVE-2011-0912
Argument injection vulnerability in IBM Lotus Notes 8.0.x prior to 8.0.2 FP6 and 8.5.x prior to 8.5.1 FP5 allows remote malicious users to execute arbitrary code via a cai:// URL containing a --launcher.library option that specifies a UNC share pathname for a DLL file, aka SPR PR...
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.2
4.3
CVSSv2
CVE-2012-4846
IBM Lotus Notes 8.5.x prior to 8.5.3 FP3 does not include the HTTPOnly flag in a Set-Cookie header for a web-application cookie, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to this cookie, aka SPRs JMAS7TRNLN and ...
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3
6.8
CVSSv2
CVE-2012-5309
servlet/traveler in IBM Lotus Notes Traveler up to and including 8.5.3.3 Interim Fix 1 does not properly restrict invalid authentication attempts, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.1.3
Ibm Lotus Notes Traveler 8.5.3.2
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.3.3
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.3.1
Ibm Lotus Notes Traveler 8.5.1.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »