Show filters
266 Total Results
Displaying 91-100 of 266
Sort by:
Attacker Value
Unknown

CVE-2020-4102

Disclosure Date: December 02, 2020 (last updated February 22, 2025)
HCL Notes is susceptible to a Buffer Overflow vulnerability in DXL due to improper validation of user input. A successful exploit could enable an attacker to crash Notes or execute attacker-controlled code on the client system.
Attacker Value
Unknown

CVE-2020-4126

Disclosure Date: December 01, 2020 (last updated February 22, 2025)
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.
Attacker Value
Unknown

CVE-2020-14258

Disclosure Date: November 21, 2020 (last updated February 22, 2025)
HCL Notes is susceptible to a Denial of Service vulnerability caused by improper validation of user-supplied input. A remote unauthenticated attacker could exploit this vulnerability using a specially-crafted email message to hang the client. Versions 9, 10 and 11 are affected.
Attacker Value
Unknown

CVE-2020-4097

Disclosure Date: November 05, 2020 (last updated February 22, 2025)
In HCL Notes version 9 previous to release 9.0.1 FixPack 10 Interim Fix 8, version 10 previous to release 10.0.1 FixPack 6 and version 11 previous to 11.0.1 FixPack 1, a vulnerability in the input parameter handling of the Notes Client could potentially be exploited by an attacker resulting in a buffer overflow. This could enable an attacker to crash HCL Notes or execute attacker-controlled code on the client.
Attacker Value
Unknown

CVE-2020-14240

Disclosure Date: November 05, 2020 (last updated February 22, 2025)
HCL Notes versions previous to releases 9.0.1 FP10 IF8, 10.0.1 FP6 and 11.0.1 FP1 is susceptible to a Stored Cross-site Scripting (XSS) vulnerability. An attacker could use this vulnerability to execute script in a victim's Web browser within the security context of the hosting Web site and/or steal the victim's cookie-based authentication credentials.
Attacker Value
Unknown

CVE-2020-7717

Disclosure Date: September 01, 2020 (last updated February 22, 2025)
All versions of package dot-notes are vulnerable to Prototype Pollution via the create function.
Attacker Value
Unknown

CVE-2020-22721

Disclosure Date: August 14, 2020 (last updated February 21, 2025)
A File Upload Vulnerability in PNotes - Andrey Gruber PNotes.NET v3.8.1.2 allows a local attacker to execute arbitrary code via the Miscellaneous " External Programs by uploading the malicious .exe file to the external program.
Attacker Value
Unknown

CVE-2017-1659

Disclosure Date: July 01, 2020 (last updated February 21, 2025)
"HCL iNotes is susceptible to a Cross-Site Scripting (XSS) Vulnerability. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials."
Attacker Value
Unknown

CVE-2020-4089

Disclosure Date: June 26, 2020 (last updated November 28, 2024)
HCL Notes is vulnerable to an information leakage vulnerability through its support for the 'mailto' protocol. This vulnerability could result in files from the user's filesystem or connected network filesystems being leaked to a third party. All versions of HCL Notes 9, 10 and 11 are affected.
Attacker Value
Unknown

CVE-2012-6277

Disclosure Date: February 21, 2020 (last updated November 28, 2024)
Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8.5.x, IBM Lotus Domino 8.5.x before 8.5.3 FP4, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, related to "a number of underlying issues" in which "some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code."