Vulnerabilities (CVE)

Filtered by vendor Activepdf Subscribe
Filtered by product Docconverter
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2007-6020 4 Activepdf, Autonomy, Ibm and 1 more 5 Docconverter, Keyview, Lotus Notes and 2 more 2023-12-10 9.3 HIGH N/A
Multiple stack-based buffer overflows in foliosr.dll in the Folio Flat File speed reader in Autonomy (formerly Verity) KeyView 10.3.0.0, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, allow remote attackers to execute arbitrary code via a long attribute value in a (1) DI, (2) FD, (3) FT, (4) JD, (5) JL, (6) LE, (7) OB, (8) OD, (9) OL, (10) PN, (11) PS, (12) PW, (13) RD, (14) QL, or (15) TS tag in a .fff file.
CVE-2007-5405 4 Activepdf, Autonomy, Ibm and 1 more 5 Docconverter, Keyview, Lotus Notes and 2 more 2023-12-10 9.3 HIGH N/A
Multiple buffer overflows in kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, allow remote attackers to execute arbitrary code via a .ag file with (1) a long ENCODING attribute in a *BEGIN tag, (2) a long token, or (3) the initial *BEGIN tag.
CVE-2007-5910 4 Activepdf, Autonomy, Ibm and 1 more 6 Docconverter, Keyview Export Sdk, Keyview Filter Sdk and 3 more 2023-12-10 9.3 HIGH N/A
Stack-based buffer overflow in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, wp6sr.dll in IBM Lotus Notes 8.0 and before 7.0.3, Symantec Mail Security, and other products, allows remote attackers to execute arbitrary code via a crafted WordPerfect (WPD) file.
CVE-2007-5909 4 Activepdf, Autonomy, Ibm and 1 more 6 Docconverter, Keyview Export Sdk, Keyview Filter Sdk and 3 more 2023-12-10 9.3 HIGH N/A
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910.