CVE-2011-1214
31.05.2011, 20:55
Stack-based buffer overflow in rtfsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted link in a .rtf attachment, aka SPR PRAD8823JQ.Enginsight
Vendor | Product | Version |
---|---|---|
ibm | lotus_notes | 𝑥 ≤ 8.5.2.2 |
ibm | lotus_notes | 3.0 |
ibm | lotus_notes | 3.0.0.1 |
ibm | lotus_notes | 3.0.0.2 |
ibm | lotus_notes | 4.2 |
ibm | lotus_notes | 4.2.1 |
ibm | lotus_notes | 4.2.2 |
ibm | lotus_notes | 4.5 |
ibm | lotus_notes | 4.6 |
ibm | lotus_notes | 4.6.7a:a |
ibm | lotus_notes | 4.6.7h:h |
ibm | lotus_notes | 5.0 |
ibm | lotus_notes | 5.0.1 |
ibm | lotus_notes | 5.0.1.02 |
ibm | lotus_notes | 5.0.1a:a |
ibm | lotus_notes | 5.0.1b:b |
ibm | lotus_notes | 5.0.1c:c |
ibm | lotus_notes | 5.0.2 |
ibm | lotus_notes | 5.0.2a:a |
ibm | lotus_notes | 5.0.2b:b |
ibm | lotus_notes | 5.0.2c:c |
ibm | lotus_notes | 5.0.3 |
ibm | lotus_notes | 5.0.4 |
ibm | lotus_notes | 5.0.4a:a |
ibm | lotus_notes | 5.0.5 |
ibm | lotus_notes | 5.0.5.01 |
ibm | lotus_notes | 5.0.5.02 |
ibm | lotus_notes | 5.0.6 |
ibm | lotus_notes | 5.0.6a:a |
ibm | lotus_notes | 5.0.6a.01:a.01 |
ibm | lotus_notes | 5.0.7 |
ibm | lotus_notes | 5.0.7a:a |
ibm | lotus_notes | 5.0.8 |
ibm | lotus_notes | 5.0.9 |
ibm | lotus_notes | 5.0.9a:a |
ibm | lotus_notes | 5.0.10 |
ibm | lotus_notes | 5.0.11 |
ibm | lotus_notes | 5.0.12 |
ibm | lotus_notes | 5.0a:a |
ibm | lotus_notes | 5.02 |
ibm | lotus_notes | 6.0 |
ibm | lotus_notes | 6.0.1 |
ibm | lotus_notes | 6.0.1:cf1 |
ibm | lotus_notes | 6.0.1:cf2 |
ibm | lotus_notes | 6.0.1:cf3 |
ibm | lotus_notes | 6.0.2 |
ibm | lotus_notes | 6.0.2:cf1 |
ibm | lotus_notes | 6.0.2:cf2 |
ibm | lotus_notes | 6.0.2.2 |
ibm | lotus_notes | 6.0.3 |
ibm | lotus_notes | 6.0.4 |
ibm | lotus_notes | 6.0.5 |
ibm | lotus_notes | 6.5 |
ibm | lotus_notes | 6.5.1 |
ibm | lotus_notes | 6.5.2 |
ibm | lotus_notes | 6.5.3 |
ibm | lotus_notes | 6.5.3.1 |
ibm | lotus_notes | 6.5.4 |
ibm | lotus_notes | 6.5.4.1 |
ibm | lotus_notes | 6.5.4.2 |
ibm | lotus_notes | 6.5.4.3 |
ibm | lotus_notes | 6.5.5 |
ibm | lotus_notes | 6.5.5.1 |
ibm | lotus_notes | 6.5.5.2 |
ibm | lotus_notes | 6.5.5.3 |
ibm | lotus_notes | 6.5.6 |
ibm | lotus_notes | 6.5.6.1 |
ibm | lotus_notes | 6.5.6.2 |
ibm | lotus_notes | 6.5.6.3 |
ibm | lotus_notes | 7.0 |
ibm | lotus_notes | 7.0.0 |
ibm | lotus_notes | 7.0.1 |
ibm | lotus_notes | 7.0.1.1 |
ibm | lotus_notes | 7.0.2 |
ibm | lotus_notes | 7.0.2.1 |
ibm | lotus_notes | 7.0.2.2 |
ibm | lotus_notes | 7.0.2.3 |
ibm | lotus_notes | 7.0.3 |
ibm | lotus_notes | 7.0.3.1 |
ibm | lotus_notes | 7.0.4 |
ibm | lotus_notes | 7.0.4.0 |
ibm | lotus_notes | 7.0.4.1 |
ibm | lotus_notes | 7.0.4.2 |
ibm | lotus_notes | 8.0 |
ibm | lotus_notes | 8.0.0 |
ibm | lotus_notes | 8.0.1 |
ibm | lotus_notes | 8.0.2 |
ibm | lotus_notes | 8.0.2.0 |
ibm | lotus_notes | 8.0.2.1 |
ibm | lotus_notes | 8.0.2.2 |
ibm | lotus_notes | 8.0.2.3 |
ibm | lotus_notes | 8.0.2.4 |
ibm | lotus_notes | 8.0.2.5 |
ibm | lotus_notes | 8.0.2.6 |
ibm | lotus_notes | 8.5 |
ibm | lotus_notes | 8.5.0.0 |
ibm | lotus_notes | 8.5.0.1 |
ibm | lotus_notes | 8.5.1 |
ibm | lotus_notes | 8.5.1.0 |
ibm | lotus_notes | 8.5.1.1 |
ibm | lotus_notes | 8.5.1.2 |
ibm | lotus_notes | 8.5.1.3 |
ibm | lotus_notes | 8.5.1.4 |
ibm | lotus_notes | 8.5.1.5 |
ibm | lotus_notes | 8.5.2.0 |
ibm | lotus_notes | 8.5.2.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References