Total vulnerabilities in the database
IBM Lotus Notes 6.0, 6.5, 7.0, and 8.0 signs an unsigned applet when a user forwards an email message to another user, which allows user-assisted remote attackers to bypass Execution Control List (ECL) protection.
Software | From | Fixed in |
---|---|---|
ibm / lotus_notes | 6.0 | 6.0.x |
ibm / lotus_notes | 7.0 | 7.0.x |
ibm / lotus_notes | 6.5 | 6.5.x |
ibm / lotus_notes | 8.0 | 8.0.x |