Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm lotus symphony 3.0.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-2886
IBM Lotus Symphony 3 before FP3 allows remote malicious users to cause a denial of service (application crash) via a .docx document with empty bullet styles for parent bullets.
Ibm Lotus Symphony 3.0.0
Ibm Lotus Symphony 3.0.0.2
Ibm Lotus Symphony 3.0.0.1
NA
CVE-2011-2884
Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."
Ibm Lotus Symphony 3.0.0.2
Ibm Lotus Symphony 3.0.0
Ibm Lotus Symphony 3.0.0.1
NA
CVE-2011-2885
IBM Lotus Symphony 3 before FP3 allows remote malicious users to cause a denial of service (application crash) via the sample .doc document that incorporates a user-defined toolbar.
Ibm Lotus Symphony 3.0.0
Ibm Lotus Symphony 3.0.0.1
Ibm Lotus Symphony 3.0.0.2
NA
CVE-2011-2893
The DataPilot feature in IBM Lotus Symphony 3 before FP3 allows user-assisted remote malicious users to cause a denial of service (application crash) via a large .xls spreadsheet with an invalid Value reference.
Ibm Lotus Symphony 3.0.0.1
Ibm Lotus Symphony 3.0.0
Ibm Lotus Symphony 3.0.0.2
NA
CVE-2011-2888
IBM Lotus Symphony 3 before FP3 allows remote malicious users to cause a denial of service (application hang) via complex graphics in a presentation.
Ibm Lotus Symphony 3.0.0
Ibm Lotus Symphony 3.0.0.2
Ibm Lotus Symphony 3.0.0.1
NA
CVE-2011-2887
IBM Lotus Symphony 3 before FP3 on Linux allows remote malicious users to cause a denial of service (application crash) via a certain sample document.
Ibm Lotus Symphony 3.0.0.1
Ibm Lotus Symphony 3.0.0
Ibm Lotus Symphony 3.0.0.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started