9.3
CVSSv2

CVE-2011-1218

Published: 31/05/2011 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in kvarcve.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a crafted .zip attachment, aka SPR PRAD8E3NSP. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

autonomy keyview

ibm lotus notes 3.0

ibm lotus notes 3.0.0.1

ibm lotus notes 3.0.0.2

ibm lotus notes 4.2

ibm lotus notes 4.2.1

ibm lotus notes 4.2.2

ibm lotus notes 4.5

ibm lotus notes 4.6

ibm lotus notes 4.6.7a

ibm lotus notes 4.6.7h

ibm lotus notes 5.0

ibm lotus notes 5.0.1

ibm lotus notes 5.0.1.02

ibm lotus notes 5.0.1a

ibm lotus notes 5.0.1b

ibm lotus notes 5.0.1c

ibm lotus notes 5.0.2

ibm lotus notes 5.0.2a

ibm lotus notes 5.0.2b

ibm lotus notes 5.0.2c

ibm lotus notes 5.0.3

ibm lotus notes 5.0.4

ibm lotus notes 5.0.4a

ibm lotus notes 5.0.5

ibm lotus notes 5.0.5.01

ibm lotus notes 5.0.5.02

ibm lotus notes 5.0.6

ibm lotus notes 5.0.6a

ibm lotus notes 5.0.6a.01

ibm lotus notes 5.0.7

ibm lotus notes 5.0.7a

ibm lotus notes 5.0.8

ibm lotus notes 5.0.9

ibm lotus notes 5.0.9a

ibm lotus notes 5.0.10

ibm lotus notes 5.0.11

ibm lotus notes 5.0.12

ibm lotus notes 5.0a

ibm lotus notes 5.02

ibm lotus notes 6.0

ibm lotus notes 6.0.1

ibm lotus notes 6.0.2

ibm lotus notes 6.0.2.2

ibm lotus notes 6.0.3

ibm lotus notes 6.0.4

ibm lotus notes 6.0.5

ibm lotus notes 6.5

ibm lotus notes 6.5.1

ibm lotus notes 6.5.2

ibm lotus notes 6.5.3

ibm lotus notes 6.5.3.1

ibm lotus notes 6.5.4

ibm lotus notes 6.5.4.1

ibm lotus notes 6.5.4.2

ibm lotus notes 6.5.4.3

ibm lotus notes 6.5.5

ibm lotus notes 6.5.5.1

ibm lotus notes 6.5.5.2

ibm lotus notes 6.5.5.3

ibm lotus notes 6.5.6

ibm lotus notes 6.5.6.1

ibm lotus notes 6.5.6.2

ibm lotus notes 6.5.6.3

ibm lotus notes 7.0

ibm lotus notes 7.0.0

ibm lotus notes 7.0.1

ibm lotus notes 7.0.1.1

ibm lotus notes 7.0.2

ibm lotus notes 7.0.2.1

ibm lotus notes 7.0.2.2

ibm lotus notes 7.0.2.3

ibm lotus notes 7.0.3

ibm lotus notes 7.0.3.1

ibm lotus notes 7.0.4

ibm lotus notes 7.0.4.0

ibm lotus notes 7.0.4.1

ibm lotus notes 7.0.4.2

ibm lotus notes 8.0

ibm lotus notes 8.0.0

ibm lotus notes 8.0.1

ibm lotus notes 8.0.2

ibm lotus notes 8.0.2.0

ibm lotus notes 8.0.2.1

ibm lotus notes 8.0.2.2

ibm lotus notes 8.0.2.3

ibm lotus notes 8.0.2.4

ibm lotus notes 8.0.2.5

ibm lotus notes 8.0.2.6

ibm lotus notes 8.5

ibm lotus notes 8.5.0.0

ibm lotus notes 8.5.0.1

ibm lotus notes 8.5.1

ibm lotus notes 8.5.1.0

ibm lotus notes 8.5.1.1

ibm lotus notes 8.5.1.2

ibm lotus notes 8.5.1.3

ibm lotus notes 8.5.1.4

ibm lotus notes 8.5.1.5

ibm lotus notes 8.5.2.0

ibm lotus notes 8.5.2.1

ibm lotus notes

Vendor Advisories

Multiple sources have identified several security issues in Autonomy’s Verity Keyview Content Filter libraries  Symantec has updated the Keyview modules being shipped with Symantec products to address these issues ...