Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
autonomy keyview vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2012-6277
Multiple unspecified vulnerabilities in Autonomy KeyView IDOL prior to 10.16, as used in Symantec Mail Security for Microsoft Exchange prior to 6.5.8, Symantec Mail Security for Domino prior to 8.1.1, Symantec Messaging Gateway prior to 10.0.1, Symantec Data Loss Prevention (DLP)...
Ibm Domino
Ibm Notes
Symantec Data Loss Prevention Endpoint
Symantec Data Loss Prevention Enforce\\/detection Servers
Symantec Mail Security 6.5.7
Symantec Mail Security
Symantec Messaging Gateway
Hp Autonomy Keyview Idol
NA
CVE-2012-6349
Buffer overflow in the .mdb parser in Autonomy KeyView IDOL, as used in IBM Notes 8.5.x prior to 8.5.3 FP4, allows remote malicious users to execute arbitrary code via a crafted file, aka SPR KLYH92XL3W.
Ibm Lotus Notes 8.5.2.2
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.5.3.3
Ibm Lotus Notes 8.5.3.2
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.2.1
Autonomy Keyview Idol -
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.5.3
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.3.1
Ibm Lotus Notes 8.5.2.3
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.4
NA
CVE-2011-0548
Buffer overflow in the Lotus Freelance Graphics PRZ file viewer in Autonomy KeyView, as used in Symantec Mail Security (SMS) 6.x up to and including 8.x, Symantec Brightmail and Messaging Gateway prior to 9.5.1, and Symantec Data Loss Prevention (DLP) prior to 10.5.3 and 11.x pri...
Symantec Mail Security 6.0.0
Symantec Mail Security 8.0
Symantec Mail Security 7.5
Symantec Brightmail And Messaging Gateway 9.0.1
Symantec Brightmail And Messaging Gateway 9.0.2
Symantec Brightmail And Messaging Gateway 7.7
Symantec Brightmail And Messaging Gateway 5.0
Symantec Brightmail And Messaging Gateway 4.0.0
Symantec Brightmail And Messaging Gateway 9.0
Symantec Brightmail And Messaging Gateway 8.0
Symantec Brightmail And Messaging Gateway
Symantec Brightmail And Messaging Gateway 4.1.0
Symantec Data Loss Prevention 10
Symantec Data Loss Prevention 8.1.1
Symantec Data Loss Prevention 11.0
Symantec Data Loss Prevention
Symantec Data Loss Prevention 8.1
Symantec Data Loss Prevention 8.0
Symantec Data Loss Prevention 10.5.1
Symantec Data Loss Prevention 10.5
Symantec Data Loss Prevention 7.1
Symantec Data Loss Prevention 7.2
NA
CVE-2011-1512
Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a malformed BIFF record in a .xls Excel spreadsheet attachment, aka SPR PRAD8E3HKR.
Ibm Lotus Notes 7.0.1
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 5.0.7a
Ibm Lotus Notes 5.0.7
Ibm Lotus Notes 5.0.4
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 5.0.1c
Ibm Lotus Notes 5.02
Ibm Lotus Notes 4.5
Ibm Lotus Notes 3.0.0.2
Ibm Lotus Notes 3.0.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.5.1.1
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.2.4
Ibm Lotus Notes 7.0.2.2
NA
CVE-2011-1217
Buffer overflow in kpprzrdr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted .prz attachment. NOTE: some of these details are obtained from third party information.
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.6a.01
Ibm Lotus Notes 5.0.6
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0.2c
Ibm Lotus Notes 5.0.1a
Ibm Lotus Notes 5.0a
Ibm Lotus Notes 4.6
Ibm Lotus Notes 4.2.2
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 7.0.4.1
Ibm Lotus Notes 7.0.4.2
NA
CVE-2011-1218
Buffer overflow in kvarcve.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted .zip attachment, aka SPR PRAD8E3NSP. NOTE: some of these details are obtained from third party information.
Ibm Lotus Notes 7.0.2
Ibm Lotus Notes 7.0.1
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 6.5.2
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.0.3
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 5.0.8
Ibm Lotus Notes 5.0.7a
Ibm Lotus Notes 5.0.7
Ibm Lotus Notes 5.0.4
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 5.0.1.02
Ibm Lotus Notes 5.0.1c
Ibm Lotus Notes 5.02
Ibm Lotus Notes 4.5
Ibm Lotus Notes 3.0.0.2
Ibm Lotus Notes 3.0.0.1
Ibm Lotus Notes 8.5.1.3
Ibm Lotus Notes 8.5.1.2
Ibm Lotus Notes 8.0.2.5
Ibm Lotus Notes 8.0.2.4
NA
CVE-2011-1213
Integer underflow in lzhsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted header in a .lzh attachment that triggers a stack-based buffer overflow, aka SPR PRAD88MJ2W.
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 7.0
Ibm Lotus Notes 6.5.1
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.7
Ibm Lotus Notes 5.0.6a.01
Ibm Lotus Notes 5.0.4a
Ibm Lotus Notes 5.0.3
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 8.0.0
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.5.6
Ibm Lotus Notes 8.0
Ibm Lotus Notes 7.0.3
Ibm Lotus Notes 6.5.5
Ibm Lotus Notes 6.5.4
Ibm Lotus Notes 6.0
Ibm Lotus Notes 6.0.5
Ibm Lotus Notes 6.0.4
Ibm Lotus Notes 5.0.9a
1 EDB exploit
NA
CVE-2011-1214
Stack-based buffer overflow in rtfsr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted link in a .rtf attachment, aka SPR PRAD8823JQ.
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.5
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.6a.01
Ibm Lotus Notes 5.0.6
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0.2c
Ibm Lotus Notes 5.0.1a
Ibm Lotus Notes 5.0a
Ibm Lotus Notes 4.6
Ibm Lotus Notes 4.2.2
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 7.0.4.1
Ibm Lotus Notes 7.0.4.2
NA
CVE-2011-1215
Stack-based buffer overflow in mw8sr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted link in a Microsoft Office document attachment, aka SPR PRAD8823ND.
Ibm Lotus Notes 8.5.1.5
Ibm Lotus Notes 8.5.1.4
Ibm Lotus Notes 8.5
Ibm Lotus Notes 8.0.2.6
Ibm Lotus Notes 8.0.2
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0
Ibm Lotus Notes 7.0.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.2.0
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.5.0.0
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 8.0.2.0
Ibm Lotus Notes 7.0.1
Ibm Lotus Notes 7.0.0
Ibm Lotus Notes 7.0.4.2
Ibm Lotus Notes 7.0.1.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes 8.5.1.0
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.0.2.3
NA
CVE-2011-1216
Stack-based buffer overflow in assr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via crafted tag data in an Applix spreadsheet attachment, aka SPR PRAD8823A7.
Ibm Lotus Notes 8.0.1
Ibm Lotus Notes 7.0.4
Ibm Lotus Notes 6.5.6
Ibm Lotus Notes 6.0.2
Ibm Lotus Notes 6.0.1
Ibm Lotus Notes 5.0.6
Ibm Lotus Notes 5.0.6a
Ibm Lotus Notes 5.0.2
Ibm Lotus Notes 5.0.2c
Ibm Lotus Notes 5.0a
Ibm Lotus Notes 5.0
Ibm Lotus Notes 4.2.2
Ibm Lotus Notes 4.2.1
Ibm Lotus Notes 8.5.2.1
Ibm Lotus Notes
Ibm Lotus Notes 8.5.1
Ibm Lotus Notes 8.5.0.1
Ibm Lotus Notes 8.0.2.2
Ibm Lotus Notes 8.0.2.1
Ibm Lotus Notes 7.0.4.1
Ibm Lotus Notes 7.0.4.2
Ibm Lotus Notes 6.5.5.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »