Page 3 of 15 results (0.002 seconds)

CVSS: 5.0EPSS: 1%CPEs: 29EXPL: 0

Buffer overflow in Notes server before Lotus Notes R4, R5 before 5.0.11, and early R6 allows remote attackers to execute arbitrary code via a long distinguished name (DN) during NotesRPC authentication and an outer field length that is less than that of the DN field. Desbordamiento de búfer en el servidor de Lotus Notes R4, R5 anteriores a 5.0.11 y betas de R6 permite a atacantes remotos ejecutar código arbitrario mediante un nombre distinguido (DN) largo durante la autenticación NotesRPC y una longitud externa del campo menor que la del campo DN. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0125.html http://marc.info/?l=bugtraq&m=104757319829443&w=2 http://www-1.ibm.com/support/docview.wss?rs=482&q=Domino&uid=swg21105101 http://www.cert.org/advisories/CA-2003-11.html http://www.ciac.org/ciac/bulletins/n-065.shtml http://www.kb.cert.org/vuls/id/433489 http://www.rapid7.com/advisories/R7-0010.html http://www.securityfocus.com/bid/7037 https://exchange.xforce.ibmcloud.com/vulnerabilities/11526 •

CVSS: 5.0EPSS: 3%CPEs: 14EXPL: 0

Buffer overflow in Lotus Domino web server before R5.0.10, when logging to DOMLOG.NSF, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP Authenticate header containing certain non-ASCII characters. • http://securitytracker.com/id?1004052 http://www.kb.cert.org/vuls/id/772563 http://www.securityfocus.com/bid/6646 https://exchange.xforce.ibmcloud.com/vulnerabilities/11058 •

CVSS: 5.0EPSS: 1%CPEs: 14EXPL: 0

Lotus Domino server 5.0.9a and earlier allows remote attackers to cause a denial of service by exhausting the number of working threads via a large number of HTTP requests for (1) an MS-DOS device name and (2) an MS-DOS device name with a large number of characters appended to the device name. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0037.html http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/945e97608fda942a85256b37007905b1?OpenDocument&Highlight=0%2CJCHN547JWV http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/a77f8a5132cce70085256b8000792112?OpenDocument&Highlight=0%2CJCHN4UMKLA http://www.securityfocus.com/archive/1/253830 http://www.securityfocus.com/bid/4019 http://www.securityfocus.com/bid/4020 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in bindsock in Lotus Domino 5.0.4 and 5.0.7 on Linux allows local users to gain root privileges via a long (1) Notes_ExecDirectory or (2) PATH environment variable. Desbordamiento de buffer en bindsock en Lotus Domino 5.0.4 a 5.0.7 en Linux permite a usuarios locales ganar privilegios de root mediante Notes_ExecDirectoryVariable de entorno PATHlargos. • http://www-1.ibm.com/support/docview.wss?uid=swg21095569 http://www-1.ibm.com/support/docview.wss?uid=swg21100441 http://www.esecurityonline.com/advisories/eSO4124.asp http://www.esecurityonline.com/advisories/eSO4126.asp http://www.securityfocus.com/bid/4317 http://www.securityfocus.com/bid/4319 https://exchange.xforce.ibmcloud.com/vulnerabilities/8583 https://exchange.xforce.ibmcloud.com/vulnerabilities/8585 •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

Lotus Domino server 5.0.9a and earlier allows remote attackers to bypass security restrictions and view Notes database files and possibly sensitive Notes template files (.ntf) via an HTTP request with a large number of "+" characters before the .nsf file extension, which are converted to spaces by Domino. • http://marc.info/?l=bugtraq&m=101284222932568&w=2 http://marc.info/?l=bugtraq&m=101285903120879&w=2 http://marc.info/?l=bugtraq&m=101286525008089&w=2 http://www.iss.net/security_center/static/8072.php http://www.nextgenss.com/papers/hpldws.pdf http://www.securityfocus.com/bid/4022 •