Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes 8.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-4549
IBM Lotus Notes Traveler prior to 8.5.1.3 on the Nokia s60 device successfully performs a Replace Data operation for a prohibited application, which allows remote authenticated users to bypass intended access restrictions via this operation.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.1.1
NA
CVE-2010-4553
An unspecified Domino API in IBM Lotus Notes Traveler prior to 8.5.1.1 does not properly handle MIME types, which allows remote malicious users to cause a denial of service (daemon crash) via unspecified vectors.
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
NA
CVE-2009-5035
The Nokia client in IBM Lotus Notes Traveler prior to 8.5.0.2 does not properly handle multiple outgoing e-mail messages between sync operations, which might allow remote malicious users to read communications intended for other recipients by examining appended messages.
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
NA
CVE-2010-1487
IBM Lotus Notes 7.0, 8.0, and 8.5 stores administrative credentials in cleartext in SURunAs.exe, which allows local users to obtain sensitive information by examining this file, aka SPR JSTN837SEG.
Ibm Lotus Notes 8.5
Ibm Lotus Notes 7.0
Ibm Lotus Notes 8.0
NA
CVE-2009-3032
Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 up to and including 5.0.13, and other products, allows context-dependent malicious users to execute ar...
Symantec Data Loss Prevention Detection Servers 9.0.1
Symantec Mail Security 8.0.2
Symantec Im Manager 2007
Symantec Mail Security 6.0.7
Symantec Mail Security 7.5.7
Symantec Mail Security 6.0.6
Ibm Lotus Notes 8.5
Symantec Data Loss Prevention Detection Servers 10.0
Symantec Mail Security 5.0.13
Symantec Mail Security 8.0.1
Symantec Data Loss Prevention Detection Servers 8.1.1
Symantec Mail Security 7.5.6
Symantec Mail Security 5.0.1.181
Symantec Mail Security 7.5.3.25
Symantec Mail Security 5.0.11
Symantec Data Loss Prevention Endpoint Agents 9.0.1
Symantec Mail Security 6.0.8
Symantec Mail Security 5.0.12
Symantec Brightmail Gateway 8.0
Symantec Mail Security 5.0.1.182
Symantec Data Loss Prevention Endpoint Agents 8.1.1
Symantec Mail Security 7.5.5.32
NA
CVE-2009-3114
The RSS reader widget in IBM Lotus Notes 8.0 and 8.5 saves items from an RSS feed as local HTML documents, which allows remote malicious users to execute arbitrary script in Internet Explorer's Local Machine Zone via a crafted feed, aka SPR RGAU7RDJ9K.
Ibm Lotus Notes 8.5
NA
CVE-2009-3037
Buffer overflow in xlssr.dll in the Autonomy KeyView XLS viewer (aka File Viewer for Excel), as used in IBM Lotus Notes 5.x up to and including 8.5.x, Symantec Mail Security, Symantec BrightMail Appliance, Symantec Data Loss Prevention (DLP), and other products, allows remote mal...
Ibm Lotus Notes 5.0
Ibm Lotus Notes 5.0.1
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0.3
Ibm Lotus Notes 5.0.4
Ibm Lotus Notes 5.0.5
Ibm Lotus Notes 5.0.6
Ibm Lotus Notes 5.0.9a
Ibm Lotus Notes 5.0.10
Ibm Lotus Notes 5.0.11
Ibm Lotus Notes 5.0.12
Ibm Lotus Notes 5.02
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.0.4
Ibm Lotus Notes 6.0.5
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.5.3
NA
CVE-2008-4564
Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and previous versions, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote malicious us...
Symantec Data Loss Prevention Detection Servers 7.0
Autonomy Keyview Filter Sdk 10.3
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.5.5
Symantec Mail Security 7.5..4.29
Ibm Lotus Notes 6.0
Autonomy Keyview Filter Sdk 9.2.0
Symantec Mail Security 5.0.1
Autonomy Keyview Filter Sdk
Symantec Mail Security 6.0.7
Autonomy Keyview Export Sdk 10.3
Symantec Enforce 8.1
Autonomy Keyview Export Sdk 10
Ibm Lotus Notes 6.0.1
Autonomy Keyview Filter Sdk 10
Autonomy Keyview Viewer Sdk
Symantec Mail Security 6.0.6
Autonomy Keyview Viewer Sdk 2.0
Symantec Data Loss Prevention Detection Servers 8.1
Symantec Enforce 8.0
Ibm Lotus Notes 5.0.3
Ibm Lotus Notes 6.5.6
NA
CVE-2008-1718
Buffer overflow in mimesr.dll in Autonomy (formerly Verity) KeyView, as used in IBM Lotus Notes prior to 8.0, might allow user-assisted remote malicious users to execute arbitrary code via an e-mail message with a crafted Text mail (MIME) attachment.
Autonomy Keyview
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.5
Ibm Lotus Notes 7.0
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.1
NA
CVE-2007-5406
kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, does not properly parse long tokens, which allows remote malicious users to cause a denial of serv...
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.5
Ibm Lotus Notes 7.0
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.1
Symantec Mail Security
Symantec Mail Security 5.0
Symantec Mail Security 5.0.0
Symantec Mail Security 5.0.1
Autonomy Keyview
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »