Vulnerabilities (CVE)

Filtered by vendor Ibm Subscribe
Filtered by product Lotus Notes Traveler
Total 25 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2010-4551 1 Ibm 1 Lotus Notes Traveler 2025-04-11 4.0 MEDIUM N/A
IBM Lotus Notes Traveler before 8.5.1.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by omitting the Internet ID field in the person document, and then using an Apple device to (1) accept or (2) decline an invitation.
CVE-2010-4545 1 Ibm 1 Lotus Notes Traveler 2025-04-11 4.0 MEDIUM N/A
IBM Lotus Notes Traveler before 8.5.1.2 allows remote authenticated users to cause a denial of service (resource consumption and sync outage) by syncing a large volume of data.
CVE-2012-4823 2 Ibm, Tivoli Storage Productivity Center 16 Java, Lotus Domino, Lotus Notes and 13 more 2025-04-11 9.3 HIGH N/A
Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes & Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allows remote attackers to execute arbitrary code via vectors related to "insecure use of the java.lang.ClassLoder defineClass() method."
CVE-2012-4825 1 Ibm 1 Lotus Notes Traveler 2025-04-11 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in servlet/traveler/ILNT.mobileconfig in IBM Lotus Notes Traveler before 8.5.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) userId or (2) address parameter in a getClientConfigFile action.
CVE-2009-5032 1 Ibm 1 Lotus Notes Traveler 2025-04-11 5.8 MEDIUM N/A
The encrypted e-mail feature in IBM Lotus Notes Traveler before 8.5.0.2 sends unencrypted messages when the feature is used without uploading a Notes ID file, which makes it easier for remote attackers to obtain sensitive information by sniffing the network.