Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus notes 8.0.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-4545
IBM Lotus Notes Traveler prior to 8.5.1.2 allows remote authenticated users to cause a denial of service (resource consumption and sync outage) by syncing a large volume of data.
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
NA
CVE-2010-4551
IBM Lotus Notes Traveler prior to 8.5.1.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by omitting the Internet ID field in the person document, and then using an Apple device to (1) accept or (2) decline an invitation...
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
NA
CVE-2010-4546
IBM Lotus Notes Traveler prior to 8.5.1.2 does not reject an attachment download request for an e-mail message with a Prevent Copy attribute, which allows remote authenticated users to bypass intended access restrictions via this request.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
NA
CVE-2010-4548
IBM Lotus Notes Traveler prior to 8.5.1.2 allows remote authenticated users to cause a denial of service (daemon crash) by accepting a meeting invitation with an iNotes client and then accepting this meeting invitation with an iPhone client.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
NA
CVE-2010-4544
Cross-site scripting (XSS) vulnerability in the servlet in IBM Lotus Notes Traveler prior to 8.5.1.3 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
NA
CVE-2010-4547
IBM Lotus Notes Traveler prior to 8.5.1.3, when a multidomain environment is used, does not properly apply policy documents to mobile users from a different Domino domain than the Traveler server, which allows remote authenticated users to bypass intended access restrictions by u...
Ibm Lotus Notes Traveler 8.0
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
NA
CVE-2010-4550
IBM Lotus Notes Traveler prior to 8.5.1.3 allows remote malicious users to cause a denial of service (sync failure) via a malformed document.
Ibm Lotus Notes Traveler
Ibm Lotus Notes Traveler 8.0.1.3
Ibm Lotus Notes Traveler 8.0.1
Ibm Lotus Notes Traveler 8.5.1.1
Ibm Lotus Notes Traveler 8.5.0.2
Ibm Lotus Notes Traveler 8.5.0.1
Ibm Lotus Notes Traveler 8.5.0.0
Ibm Lotus Notes Traveler 8.0.1.2
Ibm Lotus Notes Traveler 8.0
NA
CVE-2012-2174
The URL handler in IBM Lotus Notes 8.x prior to 8.5.3 FP2 allows remote malicious users to execute arbitrary code via a crafted notes:// URL.
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.2.2
1 EDB exploit
NA
CVE-2013-0127
IBM Lotus Notes 8.x prior to 8.5.3 FP4 Interim Fix 1 and 9.0 before Interim Fix 1 does not block APPLET elements in HTML e-mail, which allows remote malicious users to bypass intended restrictions on Java code execution and X-Confirm-Reading-To functionality via a crafted message...
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 9.0.0.0
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.2.1
NA
CVE-2013-0538
Cross-site scripting (XSS) vulnerability in IBM Lotus Notes 8.x prior to 8.5.3 FP4 Interim Fix 1 and 9.0 before Interim Fix 1 allows remote malicious users to inject arbitrary web script or HTML via a SCRIPT element in an HTML e-mail message, aka SPRs JMOY95BLM6 and JMOY95BN49.
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.3.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »