Page 2 of 8 results (0.004 seconds)

CVSS: 10.0EPSS: 3%CPEs: 14EXPL: 0

Multiple unspecified vulnerabilities in IBM Lotus Notes and Domino Server before 6.5.5 have unknown impact and attack vectors, due to "potential security issues" as identified by SPR numbers (1) GPKS6C9J67 in Agents, (2) JGAN6B6TZ3 and (3) KSPR699NBP in the Router, (4) GPKS5YQGPT in Security, or (5) HSAO6BNL6Y in the Web Server. NOTE: vector 3 is related to an issue in NROUTER in IBM Lotus Notes and Domino Server before 6.5.4 FP1, 6.5.5, and 7.0, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted vCal meeting request sent via SMTP (aka SPR# KSPR699NBP). • http://secunia.com/advisories/18328 http://secunia.com/advisories/20855 http://securitytracker.com/id?1016390 http://www-1.ibm.com/support/docview.wss?uid=swg27007054 http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/94a77eb898843aca8525709200001de1?OpenDocument&Highlight=0%2CJGAN6B6TZ3 http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/9a1650d1a771f3078525702a00420def?OpenDocument&Highlight=0%2CHSAO6BNL6Y http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/d1150fc9c5dec8b18525709200001 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

Multiple buffer overflows in Lotus Domino Server 6.0.5 and 6.5.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via large amounts of data in certain (1) time or (2) date fields. • http://marc.info/?l=bugtraq&m=111335285121320&w=2 http://secunia.com/advisories/14879 http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21202431 http://www.ngssoftware.com/advisories/lotus-01.txt http://www.osvdb.org/15364 https://exchange.xforce.ibmcloud.com/vulnerabilities/20042 •

CVSS: 5.0EPSS: 91%CPEs: 2EXPL: 1

NLSCCSTR.DLL in the web service in IBM Lotus Domino Server 6.5.1, 6.0.3, and possibly other versions allows remote attackers to cause a denial of service (deep recursion and nHTTP.exe process crash) via a long GET request containing UNICODE decimal value 430 characters, which causes the stack to be exhausted. NOTE: IBM has reported that it is unable to replicate this issue. • https://www.exploit-db.com/exploits/25353 http://news.zdnet.co.uk/software/applications/0%2C39020384%2C39194293%2C00.htm http://secunia.com/advisories/14858 http://www-1.ibm.com/support/docview.wss?uid=swg21202446 http://www.idefense.com/application/poi/display?id=224&type=vulnerabilities http://www.vupen.com/english/advisories/2005/0322 •