6 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

Cross-site scripting (XSS) vulnerability in the servlet engine and Web container in the Web Server service in IBM Lotus Domino before 7.0.3 FP1, and 8.x before 8.0.1, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en el motor de servlets y el contenedor Web en el servicio Web Server de IBM Lotus Domino anterior a 7.0.3 FP1 y 8.x anterior al 8.0.1, permite a usuarios autenticados remotamente inyectar secuencias de comandos web y HTML de su elección a través de vectores no especificados. • http://secunia.com/advisories/30310 http://secunia.com/advisories/30332 http://www-1.ibm.com/support/docview.wss?uid=swg21303296 http://www.securityfocus.com/bid/29311 http://www.vupen.com/english/advisories/2008/1597 https://exchange.xforce.ibmcloud.com/vulnerabilities/42553 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 1%CPEs: 21EXPL: 0

Unspecified vulnerability in the Lotus Domino Web Server 6.0, 6.5.x before 6.5.6, and 7.0.x before 7.0.3 allows remote attackers to cause a denial of service (daemon crash) via requests for URLs that reference certain files. Vulnerabilidad no especificada en en el servidor web de Lotus Domino 6.0, 6.5.x anterior a 6.5.6, y 7.0.x anterior a 7.0.3 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) mediante peticiones de URLs que referencian determinados archivos. • http://osvdb.org/35766 http://secunia.com/advisories/25542 http://www-1.ibm.com/support/docview.wss?uid=swg21257251 http://www.securityfocus.com/bid/24307 http://www.securitytracker.com/id?1018189 http://www.vupen.com/english/advisories/2007/2046 https://exchange.xforce.ibmcloud.com/vulnerabilities/34689 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Lotus Domino Web Server (nhttp.exe) before 6.0.1 allows remote attackers to cause a denial of service via an incomplete POST request, as demonstrated using the h_PageUI form. Lotus Domino Web Server (nhttp.exe) anteriores a la 6.0.1 permite a atacantes remotos causar la Denegación de Servicios mediante una petición POST incompleta, como se demuestra utilizando el formulario h_PageUI. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0086.html http://www-1.ibm.com/support/docview.wss?uid=swg21104528 http://www.cert.org/advisories/CA-2003-11.html http://www.ciac.org/ciac/bulletins/n-065.shtml http://www.kb.cert.org/vuls/id/355169 http://www.nextgenss.com/advisories/lotus-60dos.txt http://www.securityfocus.com/bid/6951 https://exchange.xforce.ibmcloud.com/vulnerabilities/11360 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Lotus Domino Web Server (nhttp.exe) before 6.0.1 allows remote attackers to cause a denial of service via a "Fictionary Value Field POST request" as demonstrated using the s_Validation form with a long, unknown parameter name. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0086.html http://www-1.ibm.com/support/docview.wss?uid=swg21104528 http://www.cert.org/advisories/CA-2003-11.html http://www.nextgenss.com/advisories/lotus-60dos.txt http://www.securityfocus.com/bid/6951 https://exchange.xforce.ibmcloud.com/vulnerabilities/11361 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 0

Buffer overflow in the COM Object Control Handler for Lotus Domino 6.0.1 and earlier allows remote attackers to execute arbitrary code via multiple attack vectors, as demonstrated using the InitializeUsingNotesUserName method in the iNotes ActiveX control. Desbordamiento de búfer en el manejador de control de objetos COM para Lotus Domino 6.0.1 y versiones anteriores, permite a atacantes remotos la ejecución de código arbitrario mediante vectores de ataque múltiple, como se demuestra utilizando el método InitializeUsingNotesUserName en el control ActiveX de iNotes. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0082.html http://marc.info/?l=bugtraq&m=104550124032513&w=2 http://marc.info/?l=bugtraq&m=104550335103136&w=2 http://marc.info/?l=ntbugtraq&m=104558778131373&w=2 http://marc.info/?l=ntbugtraq&m=104558778331387&w=2 http://www-1.ibm.com/support/docview.wss? •