Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes 6.5 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-6706
Unspecified vulnerability in nlnotes.dll in the client in IBM Lotus Notes 6.5, 7.0.x prior to 7.0.2 CCH or 7.0.3, and possibly 8.0 allows remote malicious users to execute arbitrary code via crafted text in an e-mail message sent over SMTP.
Ibm Lotus Notes 8.0
Ibm Lotus Notes
Ibm Lotus Notes 6.5
NA
CVE-2008-0862
IBM Lotus Notes 6.0, 6.5, 7.0, and 8.0 signs an unsigned applet when a user forwards an email message to another user, which allows user-assisted remote malicious users to bypass Execution Control List (ECL) protection.
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.5
Ibm Lotus Notes 7.0
Ibm Lotus Notes 8.0
NA
CVE-2007-6593
Multiple stack-based buffer overflows in l123sr.dll in Autonomy (formerly Verity) KeyView SDK, as used by IBM Lotus Notes 5.x up to and including 8.x, allow user-assisted remote malicious users to execute arbitrary code via the (1) Length and (2) Value fields for certain Types in...
Ibm Lotus Notes 5.0
Ibm Lotus Notes 8.0
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.5
Ibm Lotus Notes 7.0
1 EDB exploit
NA
CVE-2008-1217
Unspecified vulnerability in nlnotes.dll in the client in IBM Lotus Notes 6.5, 7.0.x prior to 7.0.2 CCH, and 8.0.x prior to 8.0.1 allows remote malicious users to execute arbitrary code via a crafted attachment in an e-mail message sent over SMTP, a variant of CVE-2007-6706.
Ibm Lotus Notes 6.5
Ibm Lotus Notes 7.0.2
Ibm Lotus Notes 8.0.0
NA
CVE-2006-3778
IBM Lotus Notes 6.0, 6.5, and 7.0 does not properly handle replies to e-mail messages with alternate name users when the (1) "Save As Draft" option is used or (2) a "," (comma) is inside the "phrase" portion of an address, which can cause the e-mail ...
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.5
Ibm Lotus Notes 7.0
NA
CVE-2004-2281
Multiple unknown vulnerabilities in IBM Lotus Notes 6.5.x prior to 6.5.4 and 6.0.x prior to 6.0.5 have unknown impact and attack vectors, related to Java applets, as identified by (1) KSPR5YS6GR and (2) KSPR62F4D3.
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.0.4
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.5.3
NA
CVE-2005-1405
HTTP response splitting vulnerability in the @SetHTTPHeader function in Lotus Domino 6.5.x prior to 6.5.4 and 6.0.x prior to 6.0.5 allows malicious users to poison the web cache via malicious applications.
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.5.3
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.0.4
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.0.1
NA
CVE-2005-1442
Buffer overflow in the Lotus Notes client for Domino 6.5 prior to 6.5.4 and 6.0 prior to 6.0.5 allows local users to cause a denial of service (client crash) and possibly execute arbitrary code via the NOTES.INI file.
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 6.5.3
Ibm Lotus Notes 6.0.4
Ibm Lotus Notes 6.5
NA
CVE-2004-0480
Argument injection vulnerability in IBM Lotus Notes 6.0.3 and 6.5 allows remote malicious users to execute arbitrary code via a notes: URI that uses a UNC network share pathname to provide an alternate notes.ini configuration file to notes.exe.
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.0.3
NA
CVE-2006-1948
The "Add Sender to Address Book" operation (AddSenderToAddressBook.lss) and NameHelper.lss in IBM Lotus Notes 6.0 and 6.5 prior to 20060331 do not properly store information in the Personal Address Book when multiple messages are checked and a message uses AltFrom, whic...
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »