Total
106 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2003-0122 | 1 Ibm | 2 Lotus Domino, Lotus Notes Client | 2024-11-20 | 5.0 MEDIUM | N/A |
Buffer overflow in Notes server before Lotus Notes R4, R5 before 5.0.11, and early R6 allows remote attackers to execute arbitrary code via a long distinguished name (DN) during NotesRPC authentication and an outer field length that is less than that of the DN field. | |||||
CVE-2002-2014 | 1 Ibm | 1 Lotus Domino | 2024-11-20 | 5.0 MEDIUM | N/A |
Lotus Domino 5.0.8 web server returns different error messages when a valid or invalid user is provided in HTTP requests, which allows remote attackers to determine valid user names and makes it easier to conduct brute force attacks. | |||||
CVE-2002-1624 | 1 Ibm | 1 Lotus Domino | 2024-11-20 | 5.0 MEDIUM | N/A |
Buffer overflow in Lotus Domino web server before R5.0.10, when logging to DOMLOG.NSF, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP Authenticate header containing certain non-ASCII characters. | |||||
CVE-2002-0086 | 1 Ibm | 1 Lotus Domino | 2024-11-20 | 7.2 HIGH | N/A |
Buffer overflow in bindsock in Lotus Domino 5.0.4 and 5.0.7 on Linux allows local users to gain root privileges via a long (1) Notes_ExecDirectory or (2) PATH environment variable. | |||||
CVE-2001-1567 | 1 Ibm | 2 Lotus Domino, Lotus Domino Server | 2024-11-20 | 5.0 MEDIUM | N/A |
Lotus Domino server 5.0.9a and earlier allows remote attackers to bypass security restrictions and view Notes database files and possibly sensitive Notes template files (.ntf) via an HTTP request with a large number of "+" characters before the .nsf file extension, which are converted to spaces by Domino. | |||||
CVE-2000-1215 | 1 Ibm | 1 Lotus Domino | 2024-11-20 | 5.0 MEDIUM | N/A |
The default configuration of Lotus Domino server 5.0.8 includes system information (version, operating system, and build date) in the HTTP headers of replies, which allows remote attackers to obtain sensitive information. |