Page 2 of 7 results (0.004 seconds)

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation. Un desbordamiento de búfer en región stack de la memoria en Forcepoint Email Security versión 8.5 permite a un atacante crear una entrada maliciosa y potencialmente bloquear un proceso creando una denegación de servicio (DoS). Si bien no se conocen vulnerabilidades de Remote Code Execution (RCE), como con todos los desbordamientos de búfer, no se puede descartar completamente la posibilidad de que RCE se ejecute. • https://help.forcepoint.com/security/CVE/CVE-2018-16530.html https://support.forcepoint.com/KBArticle?id=000016621 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A password reset vulnerability has been discovered in Forcepoint Email Security 8.5.x. The password reset URL can be used after the intended expiration period or after the URL has already been used to reset a password. Se ha descubierto una vulnerabilidad de restablecimiento de contraseña en Forcepoint Email Security 8.5.x. La URL de restablecimiento de contraseña puede utilizarse después del periodo de expiración intencionado o después de que la contraseña se haya utilizado para restablecer una contraseña. • https://help.forcepoint.com/security/CVE/CVE-2018-16529.html https://seclists.org/fulldisclosure/2018/Nov/23 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •