Total vulnerabilities in the database
The URL handler in IBM Lotus Notes 8.x before 8.5.3 FP2 allows remote attackers to execute arbitrary code via a crafted notes:// URL.
Software | From | Fixed in |
---|---|---|
ibm / lotus_notes | 8.5.2.1 | 8.5.2.1.x |
ibm / lotus_notes | 8.0.2.6 | 8.0.2.6.x |
ibm / lotus_notes | 8.5.3 | 8.5.3.x |
ibm / lotus_notes | 8.5.0.1 | 8.5.0.1.x |
ibm / lotus_notes | 8.5 | 8.5.x |
ibm / lotus_notes | 8.0.2.0 | 8.0.2.0.x |
ibm / lotus_notes | 8.5.1.3 | 8.5.1.3.x |
ibm / lotus_notes | 8.0.2.5 | 8.0.2.5.x |
ibm / lotus_notes | 8.5.1 | 8.5.1.x |
ibm / lotus_notes | 8.5.1.2 | 8.5.1.2.x |
ibm / lotus_notes | 8.5.2.3 | 8.5.2.3.x |
ibm / lotus_notes | 8.5.1.4 | 8.5.1.4.x |
ibm / lotus_notes | 8.5.2.2 | 8.5.2.2.x |
ibm / lotus_notes | 8.0.2.1 | 8.0.2.1.x |
ibm / lotus_notes | 8.0.1 | 8.0.1.x |
ibm / lotus_notes | 8.0.2.3 | 8.0.2.3.x |
ibm / lotus_notes | 8.5.2.0 | 8.5.2.0.x |
ibm / lotus_notes | 8.0.2 | 8.0.2.x |
ibm / lotus_notes | 8.0.2.4 | 8.0.2.4.x |
ibm / lotus_notes | 8.5.3.1 | 8.5.3.1.x |
ibm / lotus_notes | 8.5.0.0 | 8.5.0.0.x |
ibm / lotus_notes | 8.5.1.1 | 8.5.1.1.x |
ibm / lotus_notes | 8.5.1.0 | 8.5.1.0.x |
ibm / lotus_notes | 8.0 | 8.0.x |
ibm / lotus_notes | 8.5.1.5 | 8.5.1.5.x |
ibm / lotus_notes | 8.0.0 | 8.0.0.x |
ibm / lotus_notes | 8.0.2.2 | 8.0.2.2.x |