Page 29 of 158 results (0.003 seconds)

CVSS: 10.0EPSS: 91%CPEs: 1EXPL: 0

Multiple buffer overflows in Lotus Domino Web Server before 6.0.1 allow remote attackers to cause a denial of service or execute arbitrary code via (1) the s_ViewName option in the PresetFields parameter for iNotes, (2) the Foldername option in the PresetFields parameter for iNotes, or (3) a long Host header, which is inserted into a long Location header and used during a redirect operation. Multiples desbordamiento de búfer en Lotus Domino Web Server anteriores a la 6.0.1 permiten a atacantes remotos causar Denegación de Servicios o la ejecución de código arbitrario mediante: la opción s_ViewName en el parámetro PresetFields de iNotes la opción Foldername en el parámetro PresetFields de iNotes una cabecera Host larga, insertada en una cabecera de Localización larga y utilizada durante una operación de redirección. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0080.html http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0081.html http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0082.html http://marc.info/?l=bugtraq&m=104550063431461&w=2 http://marc.info/?l=bugtraq&m=104550063431463&w=2 http://marc.info/?l=bugtraq&m=104550335103136&w=2 http://marc.info/?l=ntbugtraq&m=104558777331345&w=2 http://marc.info/? •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 0

Buffer overflow in the COM Object Control Handler for Lotus Domino 6.0.1 and earlier allows remote attackers to execute arbitrary code via multiple attack vectors, as demonstrated using the InitializeUsingNotesUserName method in the iNotes ActiveX control. Desbordamiento de búfer en el manejador de control de objetos COM para Lotus Domino 6.0.1 y versiones anteriores, permite a atacantes remotos la ejecución de código arbitrario mediante vectores de ataque múltiple, como se demuestra utilizando el método InitializeUsingNotesUserName en el control ActiveX de iNotes. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0082.html http://marc.info/?l=bugtraq&m=104550124032513&w=2 http://marc.info/?l=bugtraq&m=104550335103136&w=2 http://marc.info/?l=ntbugtraq&m=104558778131373&w=2 http://marc.info/?l=ntbugtraq&m=104558778331387&w=2 http://www-1.ibm.com/support/docview.wss? •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Lotus Domino Web Server (nhttp.exe) before 6.0.1 allows remote attackers to cause a denial of service via an incomplete POST request, as demonstrated using the h_PageUI form. Lotus Domino Web Server (nhttp.exe) anteriores a la 6.0.1 permite a atacantes remotos causar la Denegación de Servicios mediante una petición POST incompleta, como se demuestra utilizando el formulario h_PageUI. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0086.html http://www-1.ibm.com/support/docview.wss?uid=swg21104528 http://www.cert.org/advisories/CA-2003-11.html http://www.ciac.org/ciac/bulletins/n-065.shtml http://www.kb.cert.org/vuls/id/355169 http://www.nextgenss.com/advisories/lotus-60dos.txt http://www.securityfocus.com/bid/6951 https://exchange.xforce.ibmcloud.com/vulnerabilities/11360 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Lotus Domino Web Server (nhttp.exe) before 6.0.1 allows remote attackers to cause a denial of service via a "Fictionary Value Field POST request" as demonstrated using the s_Validation form with a long, unknown parameter name. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0086.html http://www-1.ibm.com/support/docview.wss?uid=swg21104528 http://www.cert.org/advisories/CA-2003-11.html http://www.nextgenss.com/advisories/lotus-60dos.txt http://www.securityfocus.com/bid/6951 https://exchange.xforce.ibmcloud.com/vulnerabilities/11361 •

CVSS: 5.0EPSS: 1%CPEs: 29EXPL: 0

Buffer overflow in Notes server before Lotus Notes R4, R5 before 5.0.11, and early R6 allows remote attackers to execute arbitrary code via a long distinguished name (DN) during NotesRPC authentication and an outer field length that is less than that of the DN field. Desbordamiento de búfer en el servidor de Lotus Notes R4, R5 anteriores a 5.0.11 y betas de R6 permite a atacantes remotos ejecutar código arbitrario mediante un nombre distinguido (DN) largo durante la autenticación NotesRPC y una longitud externa del campo menor que la del campo DN. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0125.html http://marc.info/?l=bugtraq&m=104757319829443&w=2 http://www-1.ibm.com/support/docview.wss?rs=482&q=Domino&uid=swg21105101 http://www.cert.org/advisories/CA-2003-11.html http://www.ciac.org/ciac/bulletins/n-065.shtml http://www.kb.cert.org/vuls/id/433489 http://www.rapid7.com/advisories/R7-0010.html http://www.securityfocus.com/bid/7037 https://exchange.xforce.ibmcloud.com/vulnerabilities/11526 •