Page 2 of 9 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Symantec Brightmail AntiSpam before 6.0.2 has a hard-coded database administrator password, which allows remote attackers to gain privileges. • http://secunia.com/advisories/15562 http://securityresponse.symantec.com/avcenter/security/Content/2005.05.31a.html http://securitytracker.com/id?1014088 http://www.vupen.com/english/advisories/2005/0671 https://exchange.xforce.ibmcloud.com/vulnerabilities/20804 •

CVSS: 7.5EPSS: 0%CPEs: 49EXPL: 0

Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header. • http://securitytracker.com/id?1013133 http://www.kb.cert.org/vuls/id/107822 http://www.symantec.com/avcenter/security/Content/2005.02.08.html http://xforce.iss.net/xforce/alerts/id/187 https://exchange.xforce.ibmcloud.com/vulnerabilities/18869 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The character converters in the Spamhunter and Language ID modules for Symantec Brightmail AntiSpam 6.0.1 before patch 132 allow remote attackers to cause a denial of service (crash) via messages with the ISO-8859-10 character set, which is not recognized by the converters. • ftp://ftp.symantec.com/public/english_us_canada/products/sba/sba_60x/updates/p132_notes.htm http://secunia.com/advisories/13489 http://www.kb.cert.org/vuls/id/697598 http://www.osvdb.org/12459 https://exchange.xforce.ibmcloud.com/vulnerabilities/18530 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 2

Brightmail Spamfilter 6.0 and earlier beta releases allows remote attackers to read mail from other users by modifying the id parameter in a viewMsgDetails.do request. • https://www.exploit-db.com/exploits/24251 http://marc.info/?l=bugtraq&m=108880205115802&w=2 http://marc.info/?l=bugtraq&m=108981452101353&w=2 http://www.securityfocus.com/bid/10657 https://exchange.xforce.ibmcloud.com/vulnerabilities/16609 •