Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm notes vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2001-1504
Lotus Notes R5 Client 4.6 allows remote malicious users to execute arbitrary commands via a Lotus Notes object with code in an event, which is automatically executed when the user processes the e-mail message.
Ibm Lotus Notes 4.6
Ibm Lotus Notes 5.0
7.5
CVSSv2
CVE-2000-0891
A default ECL in Lotus Notes prior to 5.02 allows remote malicious users to execute arbitrary commands by attaching a malicious program in an email message that is automatically executed when the user opens the email.
Ibm Lotus Notes
7.5
CVSSv2
CVE-2000-1138
Lotus Notes R5 client R5.0.5 and previous versions does not properly warn users when an S/MIME email message has been modified, which could allow an malicious user to modify the email in transit without being detected.
Ibm Lotus Notes 5.0.1
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0
Ibm Lotus Notes 5.0.3
Ibm Lotus Notes 5.0.4
Ibm Lotus Notes
7.5
CVSSv2
CVE-1999-0429
The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the "Encrypt Saved Mail" preference.
Ibm Lotus Notes 4.5
7.2
CVSSv2
CVE-2018-1771
IBM Domino 9.0 and 9.0.1 could allow an malicious user to execute commands on the system by triggering a buffer overflow in the parsing of command line arguments passed to nsd.exe. IBM X-force ID: 148687.
Ibm Notes 9.0.1.10
Ibm Notes 9.0.0.0
Ibm Domino 9.0.0.0
Ibm Domino
Ibm Notes
Ibm Domino 9.0.1.10
7.2
CVSSv2
CVE-2018-1411
IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 1...
Ibm Notes 8.5.1.5
Ibm Notes 8.5.2.4
Ibm Notes 9.0
Ibm Notes 9.0.1.9
Ibm Notes 8.5.3.6
Ibm Client Application Access 1.0.0.1
Ibm Client Application Access 1.0.1.2
Ibm Client Application Access 1.0.1
7.2
CVSSv2
CVE-2018-1409
IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 1...
Ibm Notes 8.5.3.6
Ibm Notes 8.5.1.5
Ibm Notes 8.5.2.4
Ibm Notes 9.0
Ibm Notes 9.0.1.9
Ibm Client Application Access 1.0.1.2
Ibm Client Application Access 1.0.0.1
Ibm Client Application Access 1.0.1
7.2
CVSSv2
CVE-2017-1714
IBM Notes and Domino NSD 8.5 and 9.0 could allow an authenticated local user without administrative privileges to gain System privilege. IBM X-Force ID: 134633.
Ibm Notes 8.5.1.0
Ibm Notes 8.5.3.0
Ibm Notes 8.5.0.0
Ibm Notes 9.0.1.0
Ibm Notes 8.5.2.0
Ibm Notes 9.0.0.0
Ibm Client Application Access 1.0.1.2
Ibm Client Application Access 1.0.1.0
Ibm Client Application Access 1.0.1.1
7.2
CVSSv2
CVE-2015-0179
Notes System Diagnostic (NSD) in IBM Domino 8.5.x prior to 8.5.3 FP6 IF6 and 9.x prior to 9.0.1 FP3 IF1 allows local users to obtain the System privilege via unspecified vectors, aka SPR TCHL9SST8V.
Ibm Domino 8.5.1
Ibm Domino 8.5.2
Ibm Domino 8.5.3
Ibm Domino 9.0.1
Ibm Domino 8.5.0
1 EDB exploit
7.2
CVSSv2
CVE-2013-0536
ntmulti.exe in the Multi User Profile Cleanup service in IBM Notes 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.2, 8.5.3 before FP5, and 9.0 before IF2 allows local users to gain privileges via vectors that arrange for code to be executed during the next login session of a different user, ...
Ibm Lotus Notes 8.0
Ibm Lotus Notes Traveler 9.0
Ibm Lotus Inotes 8.5.2.0
Ibm Lotus Inotes 8.5.3.0
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »