Page 44 of 290 results (0.012 seconds)

CVSS: 9.3EPSS: 84%CPEs: 1EXPL: 0

Buffer overflow in the TagAttributeListCopy function in nnotes.dll in IBM Lotus Notes before 7.0.3 allows user-assisted remote attackers to execute arbitrary code via a crafted HTML email, related to duplicate RTF conversion when the recipient operates on this email. Desbordamiento de búfer en la función TagAttributeListCopy en nnotes.dll de BM Lotus Notes versiones anteriores a 7.0.3 permite a atacantes remotos con la complicidad del usuario ejecutar código de su elección mediante un correo electrónico HTML manipulado, relativo a duplicar una conversión RTF cuando el destinatario opera con este correo electrónico. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=604 http://www-1.ibm.com/support/docview.wss?rs=477&uid=swg21272930 http://www.securityfocus.com/bid/26200 http://www.securitytracker.com/id?1018857 https://exchange.xforce.ibmcloud.com/vulnerabilities/37363 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

IBM Lotus Notes before 6.5.6, and 7.x before 7.0.3; and Domino before 6.5.5 FP3, and 7.x before 7.0.2 FP1; uses weak permissions (Everyone:Full Control) for memory mapped files (shared memory) in IPC, which allows local users to obtain sensitive information, or inject Lotus Script or other character sequences into a session. IBM Lotus Notes versiones anteriores 6.5.6, y 7.x versiones anteriores a 7.0.3; y Domino versiones anteriores 6.5.5 FP3, y 7.x versiones anteriores 7.0.2 FP1; utiliza permisos débiles (Control Total:Todos) para ficheros mapeados en memoria (memoria compartida) en IPC, lo cual permite a usuarios locales obtener información confidencial, o inyectar Lotus Script u otras secuencias de caracteres en una sesión. • http://secunia.com/advisories/27321 http://www-1.ibm.com/support/docview.wss?uid=swg21257030 http://www.securityfocus.com/bid/26146 http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-013.txt http://www.vupen.com/english/advisories/2007/3598 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 3.5EPSS: 0%CPEs: 5EXPL: 0

IBM Lotus Notes 5.x through 7.0.2 allows user-assisted remote authenticated administrators to obtain a cleartext notes.id password by setting the notes.ini (1) KFM_ShowEntropy and (2) Debug_Outfile debug variables, a different vulnerability than CVE-2005-2696. IBM Lotus Notes 5.x hasta 7.0.2 permite a administradores autenticados remotamente, con la intervención del usuario, obtener una contraseña en texto claro de notes.id estableciendo las variables de depuración de notes.ini (1) KFM_ShowEntropy y (2) Debug_Outfile, una vulnerabilidad diferente de CVE-2005-2696. • http://securitytracker.com/id?1018433 http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21266085 http://www.heise-security.co.uk/news/92958 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in IBM Lotus Sametime Server 7.5.1 before 20070731 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving a crafted Sametime meeting. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en IBM Lotus Sametime Server 7.5.1 versiones anteriores a 20070731 permite a atacantes remotos inyectar scripts web o HTML de su elección mediante vectores no especificados involucrando una reunión Sametime manipulada. • http://osvdb.org/36462 http://secunia.com/advisories/26302 http://www-1.ibm.com/support/docview.wss?uid=swg21266789 http://www.securityfocus.com/bid/25167 http://www.securitytracker.com/id?1018502 http://www.vupen.com/english/advisories/2007/2734 https://exchange.xforce.ibmcloud.com/vulnerabilities/35731 •

CVSS: 9.3EPSS: 1%CPEs: 3EXPL: 0

IBM Lotus Domino 7.0.x before 7.0.3 does not revalidate the signature on a signed scheduled agent after the agent is modified, which allows remote authenticated users to gain privileges via a modified agent in a server database. IBM Lotus Domino 7.0.x versiones anteriores a 7.0.3 no revalida la firma en un agente planificado firmado después de que el agente se modifique, lo cual permite a usuarios remotos autenticados obtener privilegios mediante un agente modificado en un servidor de base de datos. • http://osvdb.org/35765 http://secunia.com/advisories/25520 http://www-1.ibm.com/support/docview.wss?uid=swg21258784 http://www.securityfocus.com/bid/24322 http://www.vupen.com/english/advisories/2007/2063 https://exchange.xforce.ibmcloud.com/vulnerabilities/34718 •