Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-1567
Lotus Domino server 5.0.9a and previous versions allows remote malicious users to bypass security restrictions and view Notes database files and possibly sensitive Notes template files (.ntf) via an HTTP request with a large number of "+" characters before the .nsf file...
Ibm Lotus Domino 5.0.6
Ibm Lotus Domino 5.0.7
Ibm Lotus Domino 5.0
Ibm Lotus Domino 5.0.1
Ibm Lotus Domino 5.0.7a
Ibm Lotus Domino 5.0.8
Ibm Lotus Domino 5.0.2
Ibm Lotus Domino 5.0.3
Ibm Lotus Domino 5.0.9
Ibm Lotus Domino Server
Ibm Lotus Domino 5.0.4
Ibm Lotus Domino 5.0.5
NA
CVE-2005-1441
Format string vulnerability in Lotus Domino 6.0.x prior to 6.0.5 and 6.5.x prior to 6.5.4 allows remote malicious users to cause a denial of service via the Notes protocol (NRPC).
Ibm Lotus Domino 6.0
Ibm Lotus Domino 6.5.3
Ibm Lotus Domino 6.0.2 Cf2
Ibm Lotus Domino 6.0.3
Ibm Lotus Domino 6.0.1
Ibm Lotus Domino 6.0.2
Ibm Lotus Domino 6.5.0
Ibm Lotus Domino 6.5.1
Ibm Lotus Domino 6.5.2
NA
CVE-2004-1621
NOTE: this issue has been disputed by the vendor. Cross-site scripting (XSS) vulnerability in IBM Lotus Notes R6 and Domino R6, and possibly earlier versions, allows remote malicious users to execute arbitrary web script or HTML via square brackets at the beginning and end of (1)...
Ibm Lotus Domino 6.5.2
Ibm Lotus Domino 6.0
Ibm Lotus Domino 6.0.2
Ibm Lotus Domino 6.0.2 Cf2
Ibm Lotus Domino 6.5.1
Ibm Lotus Domino 6.5.0
Ibm Lotus Domino 6.0.1
Ibm Lotus Domino 6.0.3
1 EDB exploit
NA
CVE-2013-0534
The Connect client in IBM Sametime 8.5.1, 8.5.1.1, 8.5.1.2, 8.5.2, and 8.5.2.1, as used in the Lotus Notes client and separately, might allow local users to obtain sensitive information by leveraging the persistence of cleartext password strings within process memory.
Ibm Sametime 8.5.1.1
Ibm Sametime 8.5.1
Ibm Lotus Sametime 8.5.2.1
Ibm Lotus Sametime 8.5.1.2
Ibm Lotus Sametime 8.5.1.1
Ibm Lotus Sametime 8.5.2
Ibm Sametime 8.5.2.1
Ibm Lotus Sametime 8.5.1
Ibm Sametime 8.5.1.2
Ibm Sametime 8.5.2
NA
CVE-2007-1784
The JNILoader ActiveX control (STJNILoader.ocx) 3.1.0.26 in IBM Lotus Notes Sametime prior to 7.5 allows remote malicious users to load arbitrary DLL libraries and execute arbitrary code via arbitrary arguments to the loadLibrary function.
Ibm Lotus Sametime 7.5
Ibm Lotus Sametime
NA
CVE-2015-0179
Notes System Diagnostic (NSD) in IBM Domino 8.5.x prior to 8.5.3 FP6 IF6 and 9.x prior to 9.0.1 FP3 IF1 allows local users to obtain the System privilege via unspecified vectors, aka SPR TCHL9SST8V.
Ibm Domino 8.5.1
Ibm Domino 8.5.2
Ibm Domino 8.5.3
Ibm Domino 9.0.1
Ibm Domino 8.5.0
1 EDB exploit
NA
CVE-2004-0029
Lotus Notes Domino 6.0.2 on Linux installs the notes.ini configuration file with world-writable permissions, which allows local users to modify the Notes configuration and gain privileges.
Ibm Lotus Domino 6.0.2
NA
CVE-1999-0729
Buffer overflow in Lotus Notes LDAP (NLDAP) allows an malicious user to conduct a denial of service through the ldap_search request.
Ibm Lotus Domino Server 4.6
7.8
CVSSv3
CVE-2022-44751
HCL Notes is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated malicious user to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vul...
Hcltech Notes 9.0.1
Hcltech Notes 10.0.1
7.8
CVSSv3
CVE-2022-44755
HCL Notes is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated malicious user to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vul...
Hcltech Notes 9.0.1
Hcltech Notes 10.0.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »