Page 2 of 16 results (0.005 seconds)

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

07 Aug 2006 — Symantec Brightmail AntiSpam (SBAS) before 6.0.4, when the Control Center is allowed to connect from any computer, allows remote attackers to cause a denial of service (application freeze) "by sending invalid posts". Symantec Brightmail AntiSpam (SBAS) anterior a 6.0.4, cuando está permitido conectarse al Centro de Control desde cualquier ordenador, permite a atacantes remotos provocar una denegación de servicio (congelación de la aplicación) enviando peticiones inválidas. • http://secunia.com/advisories/21223 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

31 Dec 2005 — Symantec Brightmail AntiSpam 6.0 build 1 and 2 allows remote attackers to cause a denial of service (bmserver component termination) via malformed MIME messages. • http://secunia.com/advisories/17170 •

CVSS: 9.8EPSS: 1%CPEs: 4EXPL: 0

07 Jun 2005 — Symantec Brightmail AntiSpam before 6.0.2 has a hard-coded database administrator password, which allows remote attackers to gain privileges. • http://secunia.com/advisories/15562 •

CVSS: 8.8EPSS: 10%CPEs: 49EXPL: 0

08 Feb 2005 — Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header. • http://securitytracker.com/id?1013133 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

17 Dec 2004 — The character converters in the Spamhunter and Language ID modules for Symantec Brightmail AntiSpam 6.0.1 before patch 132 allow remote attackers to cause a denial of service (crash) via messages with the ISO-8859-10 character set, which is not recognized by the converters. • ftp://ftp.symantec.com/public/english_us_canada/products/sba/sba_60x/updates/p132_notes.htm •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 2

13 Jul 2004 — Brightmail Spamfilter 6.0 and earlier beta releases allows remote attackers to read mail from other users by modifying the id parameter in a viewMsgDetails.do request. • https://www.exploit-db.com/exploits/24251 •