Page 3 of 34 results (0.001 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

bindsock in Lotus Domino 5.07 on Solaris allows local users to create arbitrary files via a symlink attack on temporary files. bindsock en Lotus Domino 5.07 en Solaris permite a usuarios locales crear ficheros arbitrarios mediante un ataque de enlaces simbólicos (symlink attack) en ficheros temporales. • http://www-1.ibm.com/support/docview.wss?rs=0&uid=swg21095671 http://www.esecurityonline.com/advisories/eSO4125.asp http://www.securityfocus.com/bid/4318 https://exchange.xforce.ibmcloud.com/vulnerabilities/8586 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Lotus Domino 5.0.5 and 5.0.8, and possibly other versions, allows remote attackers to cause a denial of service (block access to databases that have not been previously accessed) via a URL that includes the . (dot) directory. • http://marc.info/?l=bugtraq&m=100780146532131&w=2L:1 http://www-1.ibm.com/support/manager.wss?rs=1&rt=0&org=sims&doc=255CC03D83CFF50C85256B1E005E349B http://www.osvdb.org/2000 http://www.securityfocus.com/bid/3656 https://exchange.xforce.ibmcloud.com/vulnerabilities/7684 •

CVSS: 10.0EPSS: 2%CPEs: 14EXPL: 0

Lotus Domino 5.x allows remote attackers to read files or execute arbitrary code by requesting the ReplicaID of the Web Administrator template file (webadmin.ntf). • http://marc.info/?l=bugtraq&m=100448721830960&w=2 http://www.iss.net/security_center/static/7424.php http://www.osvdb.org/1979 https://exchange.xforce.ibmcloud.com/vulnerabilities/7424 •

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 0

Lotus Domino 5.08 and earlier allows remote attackers to cause a denial of service (crash) via a SunRPC NULL command to port 443. • http://marc.info/?l=bugtraq&m=100715316426817&w=2 http://www-1.ibm.com/support/manager.wss?rs=0&rt=0&org=sims&doc=4C8E450DBF2E7F1885256B200079FA88 http://www.osvdb.org/1998 http://www.securityfocus.com/bid/3607 https://exchange.xforce.ibmcloud.com/vulnerabilities/7631 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Lotus Domino Web Server 5.x allows remote attackers to gain sensitive information by accessing the default navigator $defaultNav via (1) URL encoding the request, or (2) directly requesting the ReplicaID. • http://marc.info/?l=bugtraq&m=100448726831108&w=2 http://www.securityfocus.com/bid/3488 https://exchange.xforce.ibmcloud.com/vulnerabilities/7423 •