Total vulnerabilities in the database
IBM Lotus Notes 8.x before 8.5.3 FP4 Interim Fix 1 and 9.0 before Interim Fix 1 does not block APPLET elements in HTML e-mail, which allows remote attackers to bypass intended restrictions on Java code execution and X-Confirm-Reading-To functionality via a crafted message, aka SPRs JMOY95BLM6 and JMOY95BN49.
Software | From | Fixed in |
---|---|---|
ibm / lotus_notes | 8.5.2.1 | 8.5.2.1.x |
ibm / lotus_notes | 8.0.2.6 | 8.0.2.6.x |
ibm / lotus_notes | 8.5.3 | 8.5.3.x |
ibm / lotus_notes | 8.5.0.1 | 8.5.0.1.x |
ibm / lotus_notes | 8.5 | 8.5.x |
ibm / lotus_notes | 8.0.2.0 | 8.0.2.0.x |
ibm / lotus_notes | 8.5.1.3 | 8.5.1.3.x |
ibm / lotus_notes | 8.0.2.5 | 8.0.2.5.x |
ibm / lotus_notes | 8.5.1 | 8.5.1.x |
ibm / lotus_notes | 8.5.1.2 | 8.5.1.2.x |
ibm / lotus_notes | 8.5.2.3 | 8.5.2.3.x |
ibm / lotus_notes | 8.5.3.3 | 8.5.3.3.x |
ibm / lotus_notes | 8.5.1.4 | 8.5.1.4.x |
ibm / lotus_notes | 8.5.2.2 | 8.5.2.2.x |
ibm / lotus_notes | 8.0.2.1 | 8.0.2.1.x |
ibm / lotus_notes | 8.0.1 | 8.0.1.x |
ibm / lotus_notes | 8.0.2.3 | 8.0.2.3.x |
ibm / lotus_notes | 8.5.2.0 | 8.5.2.0.x |
ibm / lotus_notes | 8.0.2 | 8.0.2.x |
ibm / lotus_notes | 8.0.2.4 | 8.0.2.4.x |
ibm / lotus_notes | 8.5.3.1 | 8.5.3.1.x |
ibm / lotus_notes | 8.5.0.0 | 8.5.0.0.x |
ibm / lotus_notes | 8.5.1.1 | 8.5.1.1.x |
ibm / lotus_notes | 9.0.0.0 | 9.0.0.0.x |
ibm / lotus_notes | 8.5.1.0 | 8.5.1.0.x |
ibm / lotus_notes | 8.0 | 8.0.x |
ibm / lotus_notes | 8.5.3.2 | 8.5.3.2.x |
ibm / lotus_notes | 8.5.1.5 | 8.5.1.5.x |
ibm / lotus_notes | 8.0.0 | 8.0.0.x |
ibm / lotus_notes | 8.0.2.2 | 8.0.2.2.x |