Page 2 of 8 results (0.004 seconds)

CVSS: 5.0EPSS: 1%CPEs: 14EXPL: 0

Buffer overflow in IBM Lotus Notes and Domino Server before 6.5.5 allows attackers to cause a denial of service (router crash or hang) via unspecified vectors involving "CD to MIME Conversion". • http://secunia.com/advisories/18328 http://www-1.ibm.com/support/docview.wss?uid=swg27007054 http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/50c634bfe193efa5852570e4001baace?OpenDocument http://www-10.lotus.com/ldd/r5fixlist.nsf/e7dbb5aee9a94c56852570c90056a95d/21d8fd7989fdf78d852570e4001bae68?OpenDocument http://www.securityfocus.com/bid/16158 http://www.vupen.com/english/advisories/2006/0081 https://exchange.xforce.ibmcloud.com/vulnerabilities/24205 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

Multiple buffer overflows in Lotus Domino Server 6.0.5 and 6.5.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via large amounts of data in certain (1) time or (2) date fields. • http://marc.info/?l=bugtraq&m=111335285121320&w=2 http://secunia.com/advisories/14879 http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21202431 http://www.ngssoftware.com/advisories/lotus-01.txt http://www.osvdb.org/15364 https://exchange.xforce.ibmcloud.com/vulnerabilities/20042 •

CVSS: 5.0EPSS: 91%CPEs: 2EXPL: 1

NLSCCSTR.DLL in the web service in IBM Lotus Domino Server 6.5.1, 6.0.3, and possibly other versions allows remote attackers to cause a denial of service (deep recursion and nHTTP.exe process crash) via a long GET request containing UNICODE decimal value 430 characters, which causes the stack to be exhausted. NOTE: IBM has reported that it is unable to replicate this issue. • https://www.exploit-db.com/exploits/25353 http://news.zdnet.co.uk/software/applications/0%2C39020384%2C39194293%2C00.htm http://secunia.com/advisories/14858 http://www-1.ibm.com/support/docview.wss?uid=swg21202446 http://www.idefense.com/application/poi/display?id=224&type=vulnerabilities http://www.vupen.com/english/advisories/2005/0322 •