4 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

The default configuration of the web server in IBM Lotus Domino Server, possibly 6.0 through 8.0, enables the HTTP TRACE method, which makes it easier for remote attackers to steal cookies and authentication credentials via a cross-site tracing (XST) attack, a related issue to CVE-2004-2763 and CVE-2005-3398. La configuración por defecto del servidor Web en IBM Lotus Domino Server, posiblemente v6.0 hasta v8.0, activa el método HTTP TRACE method, lo que facilita a atacantes remotos a robar las cookies y las credenciales de autenticación a través de un taques de seguimiento de trazas en sitios cruzados (XST), está relacionado con CVE-2004-2763 y CVE-2005-3398. • http://www-01.ibm.com/support/docview.wss?&uid=swg21201202 http://www.kb.cert.org/vuls/id/867593 http://www.kb.cert.org/vuls/id/AAMN-5K42VN http://www.kb.cert.org/vuls/id/AAMN-5K42VT • CWE-16: Configuration •

CVSS: 7.8EPSS: 1%CPEs: 21EXPL: 0

Unspecified vulnerability in the Lotus Domino Web Server 6.0, 6.5.x before 6.5.6, and 7.0.x before 7.0.3 allows remote attackers to cause a denial of service (daemon crash) via requests for URLs that reference certain files. Vulnerabilidad no especificada en en el servidor web de Lotus Domino 6.0, 6.5.x anterior a 6.5.6, y 7.0.x anterior a 7.0.3 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) mediante peticiones de URLs que referencian determinados archivos. • http://osvdb.org/35766 http://secunia.com/advisories/25542 http://www-1.ibm.com/support/docview.wss?uid=swg21257251 http://www.securityfocus.com/bid/24307 http://www.securitytracker.com/id?1018189 http://www.vupen.com/english/advisories/2007/2046 https://exchange.xforce.ibmcloud.com/vulnerabilities/34689 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

Multiple buffer overflows in Lotus Domino Server 6.0.5 and 6.5.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via large amounts of data in certain (1) time or (2) date fields. • http://marc.info/?l=bugtraq&m=111335285121320&w=2 http://secunia.com/advisories/14879 http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21202431 http://www.ngssoftware.com/advisories/lotus-01.txt http://www.osvdb.org/15364 https://exchange.xforce.ibmcloud.com/vulnerabilities/20042 •

CVSS: 5.0EPSS: 91%CPEs: 2EXPL: 1

NLSCCSTR.DLL in the web service in IBM Lotus Domino Server 6.5.1, 6.0.3, and possibly other versions allows remote attackers to cause a denial of service (deep recursion and nHTTP.exe process crash) via a long GET request containing UNICODE decimal value 430 characters, which causes the stack to be exhausted. NOTE: IBM has reported that it is unable to replicate this issue. • https://www.exploit-db.com/exploits/25353 http://news.zdnet.co.uk/software/applications/0%2C39020384%2C39194293%2C00.htm http://secunia.com/advisories/14858 http://www-1.ibm.com/support/docview.wss?uid=swg21202446 http://www.idefense.com/application/poi/display?id=224&type=vulnerabilities http://www.vupen.com/english/advisories/2005/0322 •