S-094: IBM Lotus Domino Web Access Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-094: IBM Lotus Domino Web Access Vulnerability
# 1  
Old 12-24-2007
S-094: IBM Lotus Domino Web Access Vulnerability

The IBM Lotus Domino Web Access ActiveX control contains multiple stack buffer overflow vulnerabilities, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The risk is MEDIUM. May allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. AIX

IBM web pack downloads: what happened?

Until 1 month ago i can download from webpack site without problems Now i go,enter my working id and pass.. and tell me We are sorry. There are no ibm.com accounts associated with the IBM ID and/or password entered. Some possible reasons are: You may have typed the wrong password ... (4 Replies)
Discussion started by: Linusolaradm1
4 Replies

2. Proxy Server

How to use Squid on Linux to control certain IP to access Web Server and certain IP cannot access?

Dear all experts here, :) I would like to install a proxy server on Linux server to perform solely to control the access of Web server. In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server. I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies

3. UNIX for Advanced & Expert Users

Forgot the privileged access password in ibm pseries615c3

Hi friends, I am having ibm pseries615c3 server. previously i set privileged access password for the firmware. Now i forgot that password. Help me to reset or remove the firmware password from the server. Otherwise anyone plz help me how to change the default boot device in pseries servers. I... (8 Replies)
Discussion started by: muthulingaraja
8 Replies
Login or Register to Ask a Question
Jifty::Web::Session::ApacheSession(3pm) 		User Contributed Perl Documentation		   Jifty::Web::Session::ApacheSession(3pm)

NAME
Jifty::Web::Session::ApacheSession - Jifty Sessions based on Apache::Session SYNOPSIS
In your etc/config.yml, using the Apache::Session::File backend: framework: Web: SessionClass: Jifty::Web::Session::ApacheSession SessionBackend: File SessionOptions: Directory: /tmp/sessions LockDirectory: /var/lock/sessions Or with Apache::Session::Memorycached backend: framework: Web: SessionClass: Jifty::Web::Session::ApacheSession SessionBackend: Memorycached SessionOptions: { servers: [ '127.0.0.1:11211' ] } new Returns a new, empty session handler, subclassing Jifty::Web::Session. id Returns the session's id if it has been loaded, or "undef" otherwise. create Creates a new session. load [ID] Load up the current session from the given "ID", or the appropriate cookie (see "cookie_name" in Jifty::Web::Session) otherwise. If both of those fail, creates a session in memory. get KEY [TYPE] See "get" in Jifty::Web::Session. set KEY => VALUE, [TYPE] See "set" in Jifty::Web::Session. remove KEY, [TYPE] See "remove" in Jifty::Web::Session. remove_all See "remove_all" in Jifty::Web::Session. continuations See "continuations" in Jifty::Web::Session. perl v5.14.2 2010-09-25 Jifty::Web::Session::ApacheSession(3pm)