CVE-2002-1624
https://notcve.org/view.php?id=CVE-2002-1624
Buffer overflow in Lotus Domino web server before R5.0.10, when logging to DOMLOG.NSF, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP Authenticate header containing certain non-ASCII characters. • http://securitytracker.com/id?1004052 http://www.kb.cert.org/vuls/id/772563 http://www.securityfocus.com/bid/6646 https://exchange.xforce.ibmcloud.com/vulnerabilities/11058 •
CVE-2002-2014
https://notcve.org/view.php?id=CVE-2002-2014
Lotus Domino 5.0.8 web server returns different error messages when a valid or invalid user is provided in HTTP requests, which allows remote attackers to determine valid user names and makes it easier to conduct brute force attacks. • http://archives.neohapsis.com/archives/bugtraq/2002-01/0373.html http://archives.neohapsis.com/archives/vuln-dev/2002-q1/0258.html http://www.iss.net/security_center/static/8038.php http://www.securityfocus.com/bid/3991 •
CVE-2002-0086
https://notcve.org/view.php?id=CVE-2002-0086
Buffer overflow in bindsock in Lotus Domino 5.0.4 and 5.0.7 on Linux allows local users to gain root privileges via a long (1) Notes_ExecDirectory or (2) PATH environment variable. Desbordamiento de buffer en bindsock en Lotus Domino 5.0.4 a 5.0.7 en Linux permite a usuarios locales ganar privilegios de root mediante Notes_ExecDirectoryVariable de entorno PATHlargos. • http://www-1.ibm.com/support/docview.wss?uid=swg21095569 http://www-1.ibm.com/support/docview.wss?uid=swg21100441 http://www.esecurityonline.com/advisories/eSO4124.asp http://www.esecurityonline.com/advisories/eSO4126.asp http://www.securityfocus.com/bid/4317 http://www.securityfocus.com/bid/4319 https://exchange.xforce.ibmcloud.com/vulnerabilities/8583 https://exchange.xforce.ibmcloud.com/vulnerabilities/8585 •
CVE-2001-1567
https://notcve.org/view.php?id=CVE-2001-1567
Lotus Domino server 5.0.9a and earlier allows remote attackers to bypass security restrictions and view Notes database files and possibly sensitive Notes template files (.ntf) via an HTTP request with a large number of "+" characters before the .nsf file extension, which are converted to spaces by Domino. • http://marc.info/?l=bugtraq&m=101284222932568&w=2 http://marc.info/?l=bugtraq&m=101285903120879&w=2 http://marc.info/?l=bugtraq&m=101286525008089&w=2 http://www.iss.net/security_center/static/8072.php http://www.nextgenss.com/papers/hpldws.pdf http://www.securityfocus.com/bid/4022 •
CVE-2000-1215
https://notcve.org/view.php?id=CVE-2000-1215
The default configuration of Lotus Domino server 5.0.8 includes system information (version, operating system, and build date) in the HTTP headers of replies, which allows remote attackers to obtain sensitive information. • http://marc.info/?l=bugtraq&m=100094373621813&w=2 http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/5552251934afaa9585256c0000737a7f?OpenDocument&Highlight=0%2CAWHN4A8QWM http://www.kb.cert.org/vuls/id/984555 https://exchange.xforce.ibmcloud.com/vulnerabilities/10685 •