Page 7 of 39 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Lotus Domino 6.5.0 and 6.5.1, with IMAP enabled, allows remote authenticated users to change their quota by using the IMAP setquota command. • http://marc.info/?l=bugtraq&m=108869022708571&w=2 http://www.securityfocus.com/bid/10642 https://exchange.xforce.ibmcloud.com/vulnerabilities/16575 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Lotus Notes Domino 6.0.2 on Linux installs the notes.ini configuration file with world-writable permissions, which allows local users to modify the Notes configuration and gain privileges. Lotus Notes Domino 6.0.2 para Linux instala el fichero de configuración notes.ini con permisos de escritura para todo el mundo, lo que permite a usuarios locales modificar la configuración de Notes y ganar privilegios. • http://marc.info/?l=bugtraq&m=107340897710308&w=2 http://secunia.com/advisories/10566 http://www.excluded.org/advisories/advisory05.txt http://www.osvdb.org/3424 http://www.securityfocus.com/bid/9366 http://www.securitytracker.com/id?1008623 https://exchange.xforce.ibmcloud.com/vulnerabilities/14153 •

CVSS: 5.0EPSS: 0%CPEs: 30EXPL: 0

Buffer overflow in Web Retriever client for Lotus Notes/Domino R4.5 through R6 allows remote malicious web servers to cause a denial of service (crash) via a long HTTP status line. Desbordamiento de búfer en el cliente Web Retriever de Lotus Notes/Domino R4.5 a R.6 permite a servidores web remotos maliciosos causar una denegación de servicio (caída) mediante una línea de estado HTTP larga. • http://marc.info/?l=bugtraq&m=104757545500368&w=2 http://www-1.ibm.com/support/docview.wss?rs=482&q=Domino&uid=swg21105060 http://www.cert.org/advisories/CA-2003-11.html http://www.ciac.org/ciac/bulletins/n-065.shtml http://www.kb.cert.org/vuls/id/411489 http://www.rapid7.com/advisories/R7-0011.html http://www.securityfocus.com/bid/7038 https://exchange.xforce.ibmcloud.com/vulnerabilities/11525 •

CVSS: 5.0EPSS: 1%CPEs: 29EXPL: 0

Buffer overflow in Notes server before Lotus Notes R4, R5 before 5.0.11, and early R6 allows remote attackers to execute arbitrary code via a long distinguished name (DN) during NotesRPC authentication and an outer field length that is less than that of the DN field. Desbordamiento de búfer en el servidor de Lotus Notes R4, R5 anteriores a 5.0.11 y betas de R6 permite a atacantes remotos ejecutar código arbitrario mediante un nombre distinguido (DN) largo durante la autenticación NotesRPC y una longitud externa del campo menor que la del campo DN. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0125.html http://marc.info/?l=bugtraq&m=104757319829443&w=2 http://www-1.ibm.com/support/docview.wss?rs=482&q=Domino&uid=swg21105101 http://www.cert.org/advisories/CA-2003-11.html http://www.ciac.org/ciac/bulletins/n-065.shtml http://www.kb.cert.org/vuls/id/433489 http://www.rapid7.com/advisories/R7-0010.html http://www.securityfocus.com/bid/7037 https://exchange.xforce.ibmcloud.com/vulnerabilities/11526 •

CVSS: 5.0EPSS: 3%CPEs: 14EXPL: 0

Buffer overflow in Lotus Domino web server before R5.0.10, when logging to DOMLOG.NSF, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP Authenticate header containing certain non-ASCII characters. • http://securitytracker.com/id?1004052 http://www.kb.cert.org/vuls/id/772563 http://www.securityfocus.com/bid/6646 https://exchange.xforce.ibmcloud.com/vulnerabilities/11058 •