Page 4 of 37 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 10EXPL: 0

16 Dec 2010 — IBM Lotus Notes Traveler before 8.5.1.3 on the Nokia s60 device successfully performs a Replace Data operation for a prohibited application, which allows remote authenticated users to bypass intended access restrictions via this operation. IBM Lotus Notes Traveler anterior a v8.5.1.3 en el dispositivo Nokia S60 realiza exitosamente una operación de sustitución de datos para una aplicación prohibida, lo que permite a usuarios autenticados remotamente eludir las restricciones de acceso previsto a través de es... • http://www-1.ibm.com/support/docview.wss?uid=swg1LO53572 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

16 Dec 2010 — IBM Lotus Notes Traveler before 8.5.1.3 allows remote attackers to cause a denial of service (sync failure) via a malformed document. IBM Lotus Notes Traveler anterior a v8.5.1.3 permite a atacantes remotos provocar una denegación de servicio (fallo de sincronización) a través de un documento mal formado. • http://www-1.ibm.com/support/docview.wss?uid=swg1LO51818 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 8EXPL: 0

16 Dec 2010 — IBM Lotus Notes Traveler before 8.5.1.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by omitting the Internet ID field in the person document, and then using an Apple device to (1) accept or (2) decline an invitation. IBM Lotus Notes Traveler anterior a v8.5.1.2 permite a usuarios remotos autenticados causar una denegación de servicio (referencia a puntero nulo -NULL- y caída de demonio), omitiendo el campo de la identificación de Internet en el ... • http://www-1.ibm.com/support/docview.wss?uid=swg1LO49829 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

16 Dec 2010 — Memory leak in IBM Lotus Notes Traveler before 8.5.1.1 allows remote attackers to cause a denial of service (memory consumption and daemon outage) by sending many embedded objects in e-mail messages for iPhone clients. Pérdida de memoria en IBM Lotus Notes Traveler antes v8.5.1.1 permite a atacantes remotos provocar una denegación de servicio (consumo de memoria y corte de demonio) mediante el envío de muchos objetos incrustados en mensajes de correo electrónico para los clientes de iPhone. • http://www-1.ibm.com/support/docview.wss?uid=swg1LO46561 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

16 Dec 2010 — An unspecified Domino API in IBM Lotus Notes Traveler before 8.5.1.1 does not properly handle MIME types, which allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors. API Domino no especificado en IBM Lotus Notes Traveler anterior a v8.5.1.1 no maneja correctamente los tipos MIME, lo cual permite a un atacante remoto provocar una denegación de servicio (caída del demonio) mediante vectores no especificados. • http://www-1.ibm.com/support/docview.wss?uid=swg1LO45478 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 12%CPEs: 3EXPL: 0

29 Apr 2010 — Stack-based buffer overflow in IBM Lotus Notes 8.5 and 8.5fp1, and possibly other versions, allows remote attackers to execute arbitrary code via unknown attack vectors, as demonstrated by the vd_ln module in VulnDisco 9.0. NOTE: as of 20100222, this disclosure has no actionable information. However, because the VulnDisco author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. Desbordamiento de búfer basado en pila en IBM Lotus Notes v8.5 y v8.5fp1, y posiblement... • http://secunia.com/advisories/38622 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.4EPSS: 30%CPEs: 20EXPL: 0

05 Oct 2002 — Buffer overflow in the ZIP capability for multiple products allows remote attackers to cause a denial of service or execute arbitrary code via ZIP files containing entries with long filenames, including (1) Microsoft Windows 98 with Plus! Pack, (2) Windows XP, (3) Windows ME, (4) Lotus Notes R4 through R6 (pre-gold), (5) Verity KeyView, and (6) Stuffit Expander before 7.0. Desbordamiento de búfer en la capacidad ZIP de múltiples productos permite a atacantes remotos causar una denegación de servicio o ejecu... • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0009.html •