Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes 8.5.0.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2010-4553
An unspecified Domino API in IBM Lotus Notes Traveler prior to 8.5.1.1 does not properly handle MIME types, which allows remote malicious users to cause a denial of service (daemon crash) via unspecified vectors.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
4.3
CVSSv2
CVE-2013-0538
Cross-site scripting (XSS) vulnerability in IBM Lotus Notes 8.x prior to 8.5.3 FP4 Interim Fix 1 and 9.0 before Interim Fix 1 allows remote malicious users to inject arbitrary web script or HTML via a SCRIPT element in an HTML e-mail message, aka SPRs JMOY95BLM6 and JMOY95BN49.
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.3.3
4.3
CVSSv2
CVE-2012-4846
IBM Lotus Notes 8.5.x prior to 8.5.3 FP3 does not include the HTTPOnly flag in a Set-Cookie header for a web-application cookie, which makes it easier for remote malicious users to obtain potentially sensitive information via script access to this cookie, aka SPRs JMAS7TRNLN and ...
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3
4.3
CVSSv2
CVE-2012-4825
Multiple cross-site scripting (XSS) vulnerabilities in servlet/traveler/ILNT.mobileconfig in IBM Lotus Notes Traveler prior to 8.5.3.2 allow remote malicious users to inject arbitrary web script or HTML via the (1) userId or (2) address parameter in a getClientConfigFile action.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.2.1
Ibm Lotus Notes Traveler 8.5.1.2
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.3
Ibm Lotus Notes Traveler 8.5.1.3
4.3
CVSSv2
CVE-2010-4544
Cross-site scripting (XSS) vulnerability in the servlet in IBM Lotus Notes Traveler prior to 8.5.1.3 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
4
CVSSv2
CVE-2010-4545
IBM Lotus Notes Traveler prior to 8.5.1.2 allows remote authenticated users to cause a denial of service (resource consumption and sync outage) by syncing a large volume of data.
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
4
CVSSv2
CVE-2010-4549
IBM Lotus Notes Traveler prior to 8.5.1.3 on the Nokia s60 device successfully performs a Replace Data operation for a prohibited application, which allows remote authenticated users to bypass intended access restrictions via this operation.
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.2
4
CVSSv2
CVE-2010-4546
IBM Lotus Notes Traveler prior to 8.5.1.2 does not reject an attachment download request for an e-mail message with a Prevent Copy attribute, which allows remote authenticated users to bypass intended access restrictions via this request.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
4
CVSSv2
CVE-2010-4551
IBM Lotus Notes Traveler prior to 8.5.1.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by omitting the Internet ID field in the person document, and then using an Apple device to (1) accept or (2) decline an invitation...
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
3.5
CVSSv2
CVE-2010-4547
IBM Lotus Notes Traveler prior to 8.5.1.3, when a multidomain environment is used, does not properly apply policy documents to mobile users from a different Domino domain than the Traveler server, which allows remote authenticated users to bypass intended access restrictions by u...
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »