Page 2 of 16 results (0.003 seconds)

CVSS: 9.0EPSS: 0%CPEs: 4EXPL: 0

Multiple unspecified vulnerabilities in the Control Center in Symantec Brightmail Gateway Appliance before 8.0.1 allow remote authenticated users to gain privileges, and possibly obtain sensitive information or hijack sessions of arbitrary users, via vectors involving (1) administrative scripts or (2) console functions. Múltiples vulnerabilidades no especificadas en el Centro de Control de Symantec Brightmail Gateway Appliance antes de v8.0.1 permiten a los usuarios remotos autenticados obtener privilegios, y posiblemente obtener información sensible o el secuestro arbitrario de sesiones de los usuarios, a través de vectores relacionados con (1) secuencias de comandos administrativos o (2) funciones de la consola. • http://osvdb.org/53945 http://secunia.com/advisories/34885 http://securitytracker.com/id?1022117 http://www.securityfocus.com/bid/34639 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090423_01 http://www.vupen.com/english/advisories/2009/1155 https://exchange.xforce.ibmcloud.com/vulnerabilities/50075 •

CVSS: 9.3EPSS: 93%CPEs: 67EXPL: 0

Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file. Desbordamiento de búfer basado en pila en wp6sr.dll en el Autonomy KeyView SDK 10.4 y anteriores, como es usado en IBM Lotus Notes, productos Symantec Mail Security (SMS), productos Symantec BrightMail Appliance y productos Symantec Data Loss Prevention (DLP) permite a atacantes remotos ejecutar código de su elección mediante un fichero Word Perfect Document (WPD) manipulado. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774 http://osvdb.org/52713 http://secunia.com/advisories/34303 http://secunia.com/advisories/34307 http://secunia.com/advisories/34318 http://secunia.com/advisories/34355 http://securitytracker.com/id?1021856 http://securitytracker.com/id?1021857 http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573 http://www.kb.cert.org/vuls/id/276563 http://www.securityfocus.com/bid/34086 http://www.se • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 18%CPEs: 168EXPL: 0

Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives. Desbordamiento de búfer basado en pila en el componente Decomposer en múltiples producto Symantec que permiten a atacantes remotos ejecutar código de su elección a través de archivos .CAB manipulados. This vulnerability allows remote attackers to execute arbitrary code on systems with affected installations of Symantec's AntiVirus Engine. User interaction is not required to exploit this vulnerability. The specific flaw exists during the process of scanning multiple maliciously formatted CAB archives. The parsing routine implicitly trusts certain user-supplied values that can result in an exploitable heap corruption. • http://osvdb.org/36118 http://secunia.com/advisories/26053 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html http://www.securityfocus.com/bid/24282 http://www.vupen.com/english/advisories/2007/2508 http://www.zerodayinitiative.com/advisories/ZDI-07-040.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 15%CPEs: 168EXPL: 0

The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header. El componente Decomposer en múltiples productos Symantec permite a atacantes remotos provocar denegación de servicio (bucles infinitos) a través de ciertos valores en el campo PACK_SIZE de una cabecera de archivo RAR. This vulnerability allows attackers to create a denial of service condition on software with vulnerable installations of the Symantec's AntiVirus engine. Authentication is not required to exploit this vulnerability. The specific flaw resides in a forged PACK_SIZE field of a RAR file header. By setting this field to a specific value an infinite loop denial of service condition will occur when the scanner processes the file. • http://osvdb.org/36119 http://secunia.com/advisories/26053 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html http://www.securityfocus.com/bid/24282 http://www.vupen.com/english/advisories/2007/2508 http://www.zerodayinitiative.com/advisories/ZDI-07-039.html •

CVSS: 7.6EPSS: 21%CPEs: 4EXPL: 0

Multiple directory traversal vulnerabilities in Symantec Brightmail AntiSpam (SBAS) before 6.0.4, when the Control Center is allowed to connect from any computer, allow remote attackers to read and overwrite certain files via directory traversal sequences in (1) DATABLOB-GET and (2) DATABLOB-SAVE requests. Múltiples vulnerabilidades de salto de directorio en Symantec Brightmail AntiSpam (SBAS) anterior a 6.0.4, cuando está permitido conectarse al Centro de Control desde cualquier ordenador, permite a atacantes remotos leer y sobrescribir ciertos ficheros mediante secuencias de salto de directorio en peticiones DATABLOB-GET y (2) DATABLOB-SAVE. • http://secunia.com/advisories/21223 http://securityresponse.symantec.com/avcenter/security/Content/2006.07.27.html http://securitytracker.com/id?1016600 http://www.osvdb.org/27589 http://www.osvdb.org/27590 http://www.securityfocus.com/bid/19182 http://www.vupen.com/english/advisories/2006/3018 https://exchange.xforce.ibmcloud.com/vulnerabilities/28058 https://exchange.xforce.ibmcloud.com/vulnerabilities/28059 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •