Page 2 of 7 results (0.012 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Symantec Brightmail AntiSpam before 6.0.2 has a hard-coded database administrator password, which allows remote attackers to gain privileges. • http://secunia.com/advisories/15562 http://securityresponse.symantec.com/avcenter/security/Content/2005.05.31a.html http://securitytracker.com/id?1014088 http://www.vupen.com/english/advisories/2005/0671 https://exchange.xforce.ibmcloud.com/vulnerabilities/20804 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The character converters in the Spamhunter and Language ID modules for Symantec Brightmail AntiSpam 6.0.1 before patch 132 allow remote attackers to cause a denial of service (crash) via messages with the ISO-8859-10 character set, which is not recognized by the converters. • ftp://ftp.symantec.com/public/english_us_canada/products/sba/sba_60x/updates/p132_notes.htm http://secunia.com/advisories/13489 http://www.kb.cert.org/vuls/id/697598 http://www.osvdb.org/12459 https://exchange.xforce.ibmcloud.com/vulnerabilities/18530 •