Vulnerabilities > IBM > Lotus Notes

DATE CVE VULNERABILITY TITLE RISK
2011-05-31 CVE-2011-1214 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in IBM Lotus Notes
Stack-based buffer overflow in rtfsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted link in a .rtf attachment, aka SPR PRAD8823JQ.
network
ibm CWE-119
critical
9.3
2011-05-31 CVE-2011-1213 Numeric Errors vulnerability in IBM Lotus Notes
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
network
ibm CWE-189
critical
9.3
2011-05-24 CVE-2011-1424 Configuration vulnerability in EMC Sourceone Email Management 6.5.2.3668
The default configuration of ExShortcut\Web.config in EMC SourceOne Email Management before 6.6 SP1, when the Mobile Services component is used, does not properly set the localOnly attribute of the trace element, which allows remote authenticated users to obtain sensitive information via ASP.NET Application Tracing.
3.5
2011-02-08 CVE-2011-0912 Improper Input Validation vulnerability in IBM Lotus Notes
Argument injection vulnerability in IBM Lotus Notes 8.0.x before 8.0.2 FP6 and 8.5.x before 8.5.1 FP5 allows remote attackers to execute arbitrary code via a cai:// URL containing a --launcher.library option that specifies a UNC share pathname for a DLL file, aka SPR PRAD82YJW2.
network
ibm CWE-20
critical
9.3
2010-04-29 CVE-2010-1608 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in IBM Lotus Notes 8.5/8.5.1/8.5.1.1
Stack-based buffer overflow in IBM Lotus Notes 8.5 and 8.5fp1, and possibly other versions, allows remote attackers to execute arbitrary code via unknown attack vectors, as demonstrated by the vd_ln module in VulnDisco 9.0.
network
low complexity
ibm CWE-119
critical
10.0
2010-04-20 CVE-2010-1487 Credentials Management vulnerability in IBM Lotus Notes 7.0/8.0/8.5
IBM Lotus Notes 7.0, 8.0, and 8.5 stores administrative credentials in cleartext in SURunAs.exe, which allows local users to obtain sensitive information by examining this file, aka SPR JSTN837SEG.
local
low complexity
ibm CWE-255
2.1
2010-03-05 CVE-2009-3032 Numeric Errors vulnerability in multiple products
Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
network
low complexity
ibm symantec CWE-189
critical
10.0
2009-09-09 CVE-2009-3114 Code Injection vulnerability in IBM Lotus Notes 8.5
The RSS reader widget in IBM Lotus Notes 8.0 and 8.5 saves items from an RSS feed as local HTML documents, which allows remote attackers to execute arbitrary script in Internet Explorer's Local Machine Zone via a crafted feed, aka SPR RGAU7RDJ9K.
network
low complexity
ibm CWE-94
7.5
2009-09-01 CVE-2009-3037 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Buffer overflow in xlssr.dll in the Autonomy KeyView XLS viewer (aka File Viewer for Excel), as used in IBM Lotus Notes 5.x through 8.5.x, Symantec Mail Security, Symantec BrightMail Appliance, Symantec Data Loss Prevention (DLP), and other products, allows remote attackers to execute arbitrary code via a crafted .xls spreadsheet attachment.
network
ibm symantec autonomy CWE-119
critical
9.3
2009-03-18 CVE-2008-4564 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file.
network
autonomy ibm symantec CWE-119
critical
9.3