Show filters
26 Total Results
Displaying 21-26 of 26
Sort by:
Attacker Value
Unknown
CVE-2006-5835
Disclosure Date: November 10, 2006 (last updated October 04, 2023)
The Notes Remote Procedure Call (NRPC) protocol in IBM Lotus Notes Domino before 6.5.5 FP2 and 7.x before 7.0.2 does not require authentication to perform user lookups, which allows remote attackers to obtain the user ID file.
0
Attacker Value
Unknown
CVE-2003-0122
Disclosure Date: March 18, 2003 (last updated February 22, 2025)
Buffer overflow in Notes server before Lotus Notes R4, R5 before 5.0.11, and early R6 allows remote attackers to execute arbitrary code via a long distinguished name (DN) during NotesRPC authentication and an outer field length that is less than that of the DN field.
0
Attacker Value
Unknown
CVE-2003-0123
Disclosure Date: March 18, 2003 (last updated February 22, 2025)
Buffer overflow in Web Retriever client for Lotus Notes/Domino R4.5 through R6 allows remote malicious web servers to cause a denial of service (crash) via a long HTTP status line.
0
Attacker Value
Unknown
CVE-2002-0370
Disclosure Date: October 10, 2002 (last updated February 22, 2025)
Buffer overflow in the ZIP capability for multiple products allows remote attackers to cause a denial of service or execute arbitrary code via ZIP files containing entries with long filenames, including (1) Microsoft Windows 98 with Plus! Pack, (2) Windows XP, (3) Windows ME, (4) Lotus Notes R4 through R6 (pre-gold), (5) Verity KeyView, and (6) Stuffit Expander before 7.0.
0
Attacker Value
Unknown
CVE-2001-1504
Disclosure Date: December 31, 2001 (last updated February 22, 2025)
Lotus Notes R5 Client 4.6 allows remote attackers to execute arbitrary commands via a Lotus Notes object with code in an event, which is automatically executed when the user processes the e-mail message.
0
Attacker Value
Unknown
CVE-2000-1138
Disclosure Date: January 09, 2001 (last updated February 22, 2025)
Lotus Notes R5 client R5.0.5 and earlier does not properly warn users when an S/MIME email message has been modified, which could allow an attacker to modify the email in transit without being detected.
0