Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus domino 7.0 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2007-0068
IBM Lotus Domino 7.0.x prior to 7.0.3 does not revalidate the signature on a signed scheduled agent after the agent is modified, which allows remote authenticated users to gain privileges via a modified agent in a server database.
Ibm Lotus Domino 7.0
Ibm Lotus Domino 7.0.1
Ibm Lotus Domino 7.0.2
694
VMScore
CVE-2008-0243
Unspecified vulnerability in Lotus Domino 7.0.2 before Fix Pack 3 allows malicious users to cause a denial of service via unknown vectors.
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino 7.0
Ibm Lotus Domino 7.0.1
694
VMScore
CVE-2005-2712
The LDAP server (nldap.exe) in IBM Lotus Domino prior to 7.0.1, 6.5.5, and 6.5.4 FP2 allows remote malicious users to cause a denial of service (crash) via a long bind request, which triggers a null dereference.
Ibm Lotus Domino 6.0.2.1
Ibm Lotus Domino 6.0.2.2
Ibm Lotus Domino 6.5.3
Ibm Lotus Domino 6.5.3.1
Ibm Lotus Domino 6.0
Ibm Lotus Domino 6.0.3
Ibm Lotus Domino 6.0.4
Ibm Lotus Domino 6.5.4
Ibm Lotus Domino 7.0
Ibm Lotus Domino 6.0.1
Ibm Lotus Domino 6.0.1.1
Ibm Lotus Domino 6.0.5
Ibm Lotus Domino 6.5
Ibm Lotus Domino 6.0.1.2
Ibm Lotus Domino 6.0.1.3
Ibm Lotus Domino 6.5.1
Ibm Lotus Domino 6.5.2
Ibm Lotus Domino 6.5.2.1
1000
VMScore
CVE-2011-1519
The remote console in the Server Controller in IBM Lotus Domino 7.x and 8.x verifies credentials against a file located at a UNC share pathname specified by the client, which allows remote malicious users to bypass authentication, and consequently execute arbitrary code, by placi...
Ibm Lotus Domino 7.0.2.3
Ibm Lotus Domino 7.0.3.1
Ibm Lotus Domino 7.0.4.1
Ibm Lotus Domino 7.0.4.2
Ibm Lotus Domino 7.0.1.1
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino 7.0.1
Ibm Lotus Domino 7.0.2.1
Ibm Lotus Domino 7.0
Ibm Lotus Domino 7.0.2.2
Ibm Lotus Domino 7.0.3
Ibm Lotus Domino 7.0.4
Ibm Lotus Domino 8.5.1.3
Ibm Lotus Domino 8.0.1
Ibm Lotus Domino 8.5.1
Ibm Lotus Domino 8.5.2
Ibm Lotus Domino 8.5.3
Ibm Lotus Domino 8.0.2
Ibm Lotus Domino 8.0.2.6
Ibm Lotus Domino 8.0.2.3
Ibm Lotus Domino 8.5.1.4
Ibm Lotus Domino 8.5.1.1
1 EDB exploit
383
VMScore
CVE-2008-7253
The default configuration of the web server in IBM Lotus Domino Server, possibly 6.0 up to and including 8.0, enables the HTTP TRACE method, which makes it easier for remote malicious users to steal cookies and authentication credentials via a cross-site tracing (XST) attack, a r...
Ibm Lotus Domino Server 6.0
Ibm Lotus Domino Server 8.0
Ibm Lotus Domino Server 7.0
Ibm Lotus Domino Server 6.5
890
VMScore
CVE-2010-0358
Heap-based buffer overflow in the server in IBM Lotus Domino 7 and 8.5 FP1 allows remote malicious users to cause a denial of service (daemon exit) and possibly have unspecified other impact via a long string in a crafted LDAP message to a TCP port, a different vulnerability than...
Ibm Lotus Domino 7.0
Ibm Lotus Domino 8.5.0.1
890
VMScore
CVE-2011-0915
Stack-based buffer overflow in nrouter.exe in IBM Lotus Domino prior to 8.5.3 allows remote malicious users to execute arbitrary code via a long name parameter in a Content-Type header in a malformed Notes calendar (aka iCalendar or iCal) meeting request, aka SPR KLYH87LL23.
Ibm Lotus Domino 5.0.9
Ibm Lotus Domino 6.0.1.2
Ibm Lotus Domino 6.0.2 Cf2
Ibm Lotus Domino 6.0.2
Ibm Lotus Domino 4.6.3
Ibm Lotus Domino 4.6.4
Ibm Lotus Domino 5.0.4
Ibm Lotus Domino 5.0.4a
Ibm Lotus Domino 6.5.2.1
Ibm Lotus Domino 6.5.0
Ibm Lotus Domino 6.5.4.1
Ibm Lotus Domino 4.6.1
Ibm Lotus Domino 7.0.2.1
Ibm Lotus Domino 7.0.2.2
Ibm Lotus Domino 8.0.2
Ibm Lotus Domino 8.0.2.1
Ibm Lotus Domino 8.5.1.1
Ibm Lotus Domino 8.5.1.2
Ibm Lotus Domino 5.0.9a
Ibm Lotus Domino 6.0.1.1
Ibm Lotus Domino 6.0.4
Ibm Lotus Domino 6.0.3
890
VMScore
CVE-2011-0913
Stack-based buffer overflow in ndiiop.exe in the DIIOP implementation in the server in IBM Lotus Domino prior to 8.5.3 allows remote malicious users to execute arbitrary code via a GIOP getEnvironmentString request, related to the local variable cache.
Ibm Lotus Domino 5.0.9
Ibm Lotus Domino 6.0.2 Cf2
Ibm Lotus Domino 6.0.2
Ibm Lotus Domino 4.6.3
Ibm Lotus Domino 4.6.4
Ibm Lotus Domino 5.0.4
Ibm Lotus Domino 5.0.4a
Ibm Lotus Domino 6.5.2.1
Ibm Lotus Domino 6.5.0
Ibm Lotus Domino 6.5.4.1
Ibm Lotus Domino 4.6.1
Ibm Lotus Domino 7.0.2.1
Ibm Lotus Domino 7.0.2.2
Ibm Lotus Domino 7.0.2.3
Ibm Lotus Domino 8.0.2
Ibm Lotus Domino 8.0.2.1
Ibm Lotus Domino 8.5.1.1
Ibm Lotus Domino 8.5.1.2
Ibm Lotus Domino 5.0.9a
Ibm Lotus Domino 6.0.1.1
Ibm Lotus Domino 6.0.1
Ibm Lotus Domino 6.0.4
890
VMScore
CVE-2011-0914
Integer signedness error in ndiiop.exe in the DIIOP implementation in the server in IBM Lotus Domino prior to 8.5.3 allows remote malicious users to execute arbitrary code via a GIOP client request, leading to a heap-based buffer overflow.
Ibm Lotus Domino 6.0
Ibm Lotus Domino 5.0.9a
Ibm Lotus Domino 6.0.2.1
Ibm Lotus Domino 6.0.4
Ibm Lotus Domino 5.0.1
Ibm Lotus Domino 5.0.10
Ibm Lotus Domino 5.0.6
Ibm Lotus Domino 5.0.6a
Ibm Lotus Domino 6.5.4
Ibm Lotus Domino 6.5.3
Ibm Lotus Domino 6.0.1.2
Ibm Lotus Domino 6.0.2 Cf2
Ibm Lotus Domino 6.0.5
Ibm Lotus Domino 4.6.3
Ibm Lotus Domino 5.0.3
Ibm Lotus Domino 5.0.4
Ibm Lotus Domino 6.5.2
Ibm Lotus Domino 6.5.2.1
Ibm Lotus Domino 6.5.4.3
Ibm Lotus Domino 6.5.4.1
Ibm Lotus Domino 7.0.2
Ibm Lotus Domino 7.0.2.1
383
VMScore
CVE-2008-2410
Cross-site scripting (XSS) vulnerability in the servlet engine and Web container in the Web Server service in IBM Lotus Domino prior to 7.0.3 FP1, and 8.x prior to 8.0.1, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
Ibm Lotus Domino Web Server 7.0
Ibm Lotus Domino Web Server 7.0.3
Ibm Lotus Domino Web Server
Ibm Lotus Domino Web Server 7.0.1
Ibm Lotus Domino Web Server 7.0.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »