9.3
CVSSv2

CVE-2011-1216

Published: 31/05/2011 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in assr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via crafted tag data in an Applix spreadsheet attachment, aka SPR PRAD8823A7.

Vulnerable Product Search on Vulmon Subscribe to Product

ibm lotus notes 3.0

ibm lotus notes 3.0.0.1

ibm lotus notes 3.0.0.2

ibm lotus notes 4.2

ibm lotus notes 4.2.1

ibm lotus notes 4.2.2

ibm lotus notes 4.5

ibm lotus notes 4.6

ibm lotus notes 4.6.7a

ibm lotus notes 4.6.7h

ibm lotus notes 5.0

ibm lotus notes 5.0.1

ibm lotus notes 5.0.1.02

ibm lotus notes 5.0.1a

ibm lotus notes 5.0.1b

ibm lotus notes 5.0.1c

ibm lotus notes 5.0.2

ibm lotus notes 5.0.2a

ibm lotus notes 5.0.2b

ibm lotus notes 5.0.2c

ibm lotus notes 5.0.3

ibm lotus notes 5.0.4

ibm lotus notes 5.0.4a

ibm lotus notes 5.0.5

ibm lotus notes 5.0.5.01

ibm lotus notes 5.0.5.02

ibm lotus notes 5.0.6

ibm lotus notes 5.0.6a

ibm lotus notes 5.0.6a.01

ibm lotus notes 5.0.7

ibm lotus notes 5.0.7a

ibm lotus notes 5.0.8

ibm lotus notes 5.0.9

ibm lotus notes 5.0.9a

ibm lotus notes 5.0.10

ibm lotus notes 5.0.11

ibm lotus notes 5.0.12

ibm lotus notes 5.0a

ibm lotus notes 5.02

ibm lotus notes 6.0

ibm lotus notes 6.0.1

ibm lotus notes 6.0.2

ibm lotus notes 6.0.2.2

ibm lotus notes 6.0.3

ibm lotus notes 6.0.4

ibm lotus notes 6.0.5

ibm lotus notes 6.5

ibm lotus notes 6.5.1

ibm lotus notes 6.5.2

ibm lotus notes 6.5.3

ibm lotus notes 6.5.3.1

ibm lotus notes 6.5.4

ibm lotus notes 6.5.4.1

ibm lotus notes 6.5.4.2

ibm lotus notes 6.5.4.3

ibm lotus notes 6.5.5

ibm lotus notes 6.5.5.1

ibm lotus notes 6.5.5.2

ibm lotus notes 6.5.5.3

ibm lotus notes 6.5.6

ibm lotus notes 6.5.6.1

ibm lotus notes 6.5.6.2

ibm lotus notes 6.5.6.3

ibm lotus notes 7.0

ibm lotus notes 7.0.0

ibm lotus notes 7.0.1

ibm lotus notes 7.0.1.1

ibm lotus notes 7.0.2

ibm lotus notes 7.0.2.1

ibm lotus notes 7.0.2.2

ibm lotus notes 7.0.2.3

ibm lotus notes 7.0.3

ibm lotus notes 7.0.3.1

ibm lotus notes 7.0.4

ibm lotus notes 7.0.4.0

ibm lotus notes 7.0.4.1

ibm lotus notes 7.0.4.2

ibm lotus notes 8.0

ibm lotus notes 8.0.0

ibm lotus notes 8.0.1

ibm lotus notes 8.0.2

ibm lotus notes 8.0.2.0

ibm lotus notes 8.0.2.1

ibm lotus notes 8.0.2.2

ibm lotus notes 8.0.2.3

ibm lotus notes 8.0.2.4

ibm lotus notes 8.0.2.5

ibm lotus notes 8.0.2.6

ibm lotus notes 8.5

ibm lotus notes 8.5.0.0

ibm lotus notes 8.5.0.1

ibm lotus notes 8.5.1

ibm lotus notes 8.5.1.0

ibm lotus notes 8.5.1.1

ibm lotus notes 8.5.1.2

ibm lotus notes 8.5.1.3

ibm lotus notes 8.5.1.4

ibm lotus notes 8.5.1.5

ibm lotus notes 8.5.2.0

ibm lotus notes 8.5.2.1

ibm lotus notes

Vendor Advisories

Multiple sources have identified several security issues in Autonomy’s Verity Keyview Content Filter libraries  Symantec has updated the Keyview modules being shipped with Symantec products to address these issues ...