Total vulnerabilities in the database
IBM Lotus Notes Traveler before 8.5.1.3 on the Nokia s60 device successfully performs a Replace Data operation for a prohibited application, which allows remote authenticated users to bypass intended access restrictions via this operation.
Software | From | Fixed in |
---|---|---|
ibm / lotus_notes_traveler | - | 8.5.1.2.x |
ibm / lotus_notes_traveler | 8.0 | 8.0.x |
ibm / lotus_notes_traveler | 8.0.1 | 8.0.1.x |
ibm / lotus_notes_traveler | 8.0.1.2 | 8.0.1.2.x |
ibm / lotus_notes_traveler | 8.0.1.3 | 8.0.1.3.x |
ibm / lotus_notes_traveler | 8.5.0.0 | 8.5.0.0.x |
ibm / lotus_notes_traveler | 8.5.0.1 | 8.5.0.1.x |
ibm / lotus_notes_traveler | 8.5.0.2 | 8.5.0.2.x |
ibm / lotus_notes_traveler | 8.5.1.1 | 8.5.1.1.x |