Page 2 of 14 results (0.003 seconds)

CVSS: 9.8EPSS: 87%CPEs: 2EXPL: 5

08 Sep 2005 — img.pl in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to execute arbitrary commands via shell metacharacters in the f parameter. • https://www.exploit-db.com/exploits/16893 •

CVSS: 7.5EPSS: 45%CPEs: 2EXPL: 3

08 Sep 2005 — Directory traversal vulnerability in img.pl in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to read arbitrary files via a .. (dot dot) in the f parameter. • https://www.exploit-db.com/exploits/1236 •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

08 Sep 2005 — Argument injection vulnerability in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to (1) read portions of source code via the -f option to Dig (dig_device.cgi), (2) determine file existence via the -r argument to Tcpdump (tcpdump_device.cgi) or (3) modify files in the cgi-bin directory via the -w argument to Tcpdump. • http://marc.info/?l=bugtraq&m=112560044813390&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

15 Feb 2005 — Barracuda Spam Firewall 3.1.10 and earlier does not restrict the domains that white-listed domains can send mail to, which allows members of white-listed domains to use Barracuda as an open mail relay for spam. • http://marc.info/?l=bugtraq&m=110805534732492&w=2 •