Page 3 of 22 results (0.006 seconds)

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 2

Cross-site scripting (XSS) vulnerability in IBM Lotus Domino 6.5.2 allows remote attackers to inject arbitrary web script or HTML via the (1) BaseTarget or (2) Src parameters. • http://secunia.com/advisories/16830 http://www-1.ibm.com/support/docview.wss?rs=0&uid=swg1LO07849&loc=en_US&cs=utf-8&cc=us&lang=all http://www-1.ibm.com/support/docview.wss?uid=swg1LO07850 http://www.securityfocus.com/bid/14845 http://www.securityfocus.com/bid/14846 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

Multiple buffer overflows in Lotus Domino Server 6.0.5 and 6.5.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via large amounts of data in certain (1) time or (2) date fields. • http://marc.info/?l=bugtraq&m=111335285121320&w=2 http://secunia.com/advisories/14879 http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21202431 http://www.ngssoftware.com/advisories/lotus-01.txt http://www.osvdb.org/15364 https://exchange.xforce.ibmcloud.com/vulnerabilities/20042 •

CVSS: 5.0EPSS: 91%CPEs: 2EXPL: 1

NLSCCSTR.DLL in the web service in IBM Lotus Domino Server 6.5.1, 6.0.3, and possibly other versions allows remote attackers to cause a denial of service (deep recursion and nHTTP.exe process crash) via a long GET request containing UNICODE decimal value 430 characters, which causes the stack to be exhausted. NOTE: IBM has reported that it is unable to replicate this issue. • https://www.exploit-db.com/exploits/25353 http://news.zdnet.co.uk/software/applications/0%2C39020384%2C39194293%2C00.htm http://secunia.com/advisories/14858 http://www-1.ibm.com/support/docview.wss?uid=swg21202446 http://www.idefense.com/application/poi/display?id=224&type=vulnerabilities http://www.vupen.com/english/advisories/2005/0322 •

CVSS: 10.0EPSS: 91%CPEs: 1EXPL: 0

Multiple buffer overflows in Lotus Domino Web Server before 6.0.1 allow remote attackers to cause a denial of service or execute arbitrary code via (1) the s_ViewName option in the PresetFields parameter for iNotes, (2) the Foldername option in the PresetFields parameter for iNotes, or (3) a long Host header, which is inserted into a long Location header and used during a redirect operation. Multiples desbordamiento de búfer en Lotus Domino Web Server anteriores a la 6.0.1 permiten a atacantes remotos causar Denegación de Servicios o la ejecución de código arbitrario mediante: la opción s_ViewName en el parámetro PresetFields de iNotes la opción Foldername en el parámetro PresetFields de iNotes una cabecera Host larga, insertada en una cabecera de Localización larga y utilizada durante una operación de redirección. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0080.html http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0081.html http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0082.html http://marc.info/?l=bugtraq&m=104550063431461&w=2 http://marc.info/?l=bugtraq&m=104550063431463&w=2 http://marc.info/?l=bugtraq&m=104550335103136&w=2 http://marc.info/?l=ntbugtraq&m=104558777331345&w=2 http://marc.info/? •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 0

Buffer overflow in the COM Object Control Handler for Lotus Domino 6.0.1 and earlier allows remote attackers to execute arbitrary code via multiple attack vectors, as demonstrated using the InitializeUsingNotesUserName method in the iNotes ActiveX control. Desbordamiento de búfer en el manejador de control de objetos COM para Lotus Domino 6.0.1 y versiones anteriores, permite a atacantes remotos la ejecución de código arbitrario mediante vectores de ataque múltiple, como se demuestra utilizando el método InitializeUsingNotesUserName en el control ActiveX de iNotes. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0082.html http://marc.info/?l=bugtraq&m=104550124032513&w=2 http://marc.info/?l=bugtraq&m=104550335103136&w=2 http://marc.info/?l=ntbugtraq&m=104558778131373&w=2 http://marc.info/?l=ntbugtraq&m=104558778331387&w=2 http://www-1.ibm.com/support/docview.wss? •