S-094: IBM Lotus Domino Web Access Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-094: IBM Lotus Domino Web Access Vulnerability
# 1  
Old 12-24-2007
S-094: IBM Lotus Domino Web Access Vulnerability

The IBM Lotus Domino Web Access ActiveX control contains multiple stack buffer overflow vulnerabilities, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The risk is MEDIUM. May allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. AIX

IBM web pack downloads: what happened?

Until 1 month ago i can download from webpack site without problems Now i go,enter my working id and pass.. and tell me We are sorry. There are no ibm.com accounts associated with the IBM ID and/or password entered. Some possible reasons are: You may have typed the wrong password ... (4 Replies)
Discussion started by: Linusolaradm1
4 Replies

2. Proxy Server

How to use Squid on Linux to control certain IP to access Web Server and certain IP cannot access?

Dear all experts here, :) I would like to install a proxy server on Linux server to perform solely to control the access of Web server. In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server. I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies

3. UNIX for Advanced & Expert Users

Forgot the privileged access password in ibm pseries615c3

Hi friends, I am having ibm pseries615c3 server. previously i set privileged access password for the firmware. Now i forgot that password. Help me to reset or remove the firmware password from the server. Otherwise anyone plz help me how to change the default boot device in pseries servers. I... (8 Replies)
Discussion started by: muthulingaraja
8 Replies
Login or Register to Ask a Question
Jifty::Web::Session::None(3pm)				User Contributed Perl Documentation			    Jifty::Web::Session::None(3pm)

NAME
Jifty::Web::Session::None - A null session handler for jifty DESCRIPTION
Jifty depends on its sessions to keep users logged in, to store continuations and to allow developers to store user-specific data. In general, you don't want to disable them. But sometimes, the development benefits of Jifty lead you to build applications that genuinely don't want per-user sessions. That's where "Jifty::Web::Session::None" comes in. By specifying that you want to use "Jifty::Web::Session::None" as your Jifty session handler, you tell Jifty to avoid ever reading, writing or storing a user session. No cookies get set. Nothing gets stored in the database. USAGE
In your "etc/config.yml": --- framework: Web: SessionClass:: Jifty::Web::Session::None METHODS
All methods in this class are dummy methods which do no work. This class mocks the API provided by "Jifty::Web::Session". new Takes no arguments. Returns a Jifty::Web::Session::None. id Returns false. create Returns true. load Returns true. unload Returns true. loaded Returns true. get Returns false. set Returns false. remove Returns true. set_continuation Returns false. get_continuation Returns false. remove_continuation Returns false. continuations Returns false. set_cookie Returns false. cookie_name Returns false. expires Returns false. perl v5.14.2 2010-09-25 Jifty::Web::Session::None(3pm)