CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
83.4%
Buffer overflow in the .mdb parser in Autonomy KeyView IDOL, as used in IBM Notes 8.5.x before 8.5.3 FP4, allows remote attackers to execute arbitrary code via a crafted file, aka SPR KLYH92XL3W.
Vendor | Product | Version | CPE |
---|---|---|---|
autonomy | keyview_idol | - | cpe:2.3:a:autonomy:keyview_idol:-:*:*:*:*:*:*:* |
ibm | lotus_notes | 8.5 | cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:* |
ibm | lotus_notes | 8.5.0.0 | cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:* |
ibm | lotus_notes | 8.5.0.1 | cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:* |
ibm | lotus_notes | 8.5.1 | cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:* |
ibm | lotus_notes | 8.5.1.0 | cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:* |
ibm | lotus_notes | 8.5.1.1 | cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:* |
ibm | lotus_notes | 8.5.1.2 | cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:* |
ibm | lotus_notes | 8.5.1.3 | cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:* |
ibm | lotus_notes | 8.5.1.4 | cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:* |