• Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings
Lotus Domino Servers 5.x, 4.6x, and 4.5x allows attackers to bypass the intended Reader and Author access list for a document's object via a Notes API call (NSFDbReadObject) that directly accesses the object.
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
Date Entry Created
20020116 Disclaimer: The entry creation date may reflect when the CVE-ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Modified (20050528)
Votes (Legacy)
ACCEPT(3) Cole, Green, Wall
MODIFY(1) Frech
NOOP(4) Armstrong, Christey, Cox, Foat
Comments (Legacy)
 Christey> Need to find some references for these... probably in
   the CERT/CC vulnerability notes.
 Frech> XF:lotus-domino-nsfdbreadobject(10095)
 Christey> Is this the same issue here?
   BUGTRAQ:20011217 Lotus Notes: File attachments may be extracted regardless of document security

Proposed (Legacy)
This is an entry on the CVE list, which standardizes names for security problems.