
CVE-2002-1463 – Linux Kernel 2.2 - Predictable TCP Initial Sequence Number
https://notcve.org/view.php?id=CVE-2002-1463
09 Jun 2003 — Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections. Symantec Raptor Firewall 6.5 y 6.5.3, Enterprise Firewall 6.5.2 y 7.0, VelociRaptor modelos 500/700/1000 y 1100/1200/1300, y Gateway Security 5110/5200/5300 generan secuencias numéricas iniciales (ISN) fácilmente predecibles, lo que per... • https://www.exploit-db.com/exploits/19522 •

CVE-2003-0106
https://notcve.org/view.php?id=CVE-2003-0106
27 Mar 2003 — The HTTP proxy for Symantec Enterprise Firewall (SEF) 7.0 allows proxy users to bypass pattern matching for blocked URLs via requests that are URL-encoded with escapes, Unicode, or UTF-8. El proxy HTTP de Symantec Enterprise Firewall (SEF) 7.0 permite a usuarios del proxy evitar la comprobación de patrones de URLs bloqueadas mediante peticiones codificadas en la URL con escapes, Unicode, o UTF-8. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0152.html •

CVE-2002-1535
https://notcve.org/view.php?id=CVE-2002-1535
18 Mar 2003 — Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote attackers to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present. Secure Webserver 1.1 en Raptor 6.5 y Symantec Enterprise Firewall 6.5.2 permite a atacantes remotos la identificación de direcciones IP de equipos en red mediante una petición CONNECT, que genera un mensajes de error distinto en caso de que el equipo este presente. • http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html •

CVE-2002-2294
https://notcve.org/view.php?id=CVE-2002-2294
31 Dec 2002 — Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd). • http://www.securityfocus.com/bid/6389 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2002-0990
https://notcve.org/view.php?id=CVE-2002-0990
28 Oct 2002 — The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout. El componente de proxy web en Symantec Enterprise Firewall (SEF) 6.5.2 a 7.0, Raptor Firewall 6.5 y 6.5.3, VelociRaptor, y Symantec Gateway Sec... • http://marc.info/?l=bugtraq&m=103463869503124&w=2 •

CVE-2002-0538
https://notcve.org/view.php?id=CVE-2002-0538
03 Jul 2002 — FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0166.html •

CVE-2002-0309
https://notcve.org/view.php?id=CVE-2002-0309
31 May 2002 — SMTP proxy in Symantec Enterprise Firewall (SEF) 6.5.x includes the firewall's physical interface name and address in an SMTP protocol exchange when NAT translation is made to an address other than the firewall, which could allow remote attackers to determine certain firewall configuration information. El proxy SMTP en Symantec Enterprise Firewall 6.5.x incluye el nombre y la dirección del interfaz físico del cortafuegos en un intercambio de mensajes SMTP cuando la traduzzión NAT (network address translatio... • http://marc.info/?l=bugtraq&m=101424307617060&w=2 •

CVE-2002-0302
https://notcve.org/view.php?id=CVE-2002-0302
31 May 2002 — The Notify daemon for Symantec Enterprise Firewall (SEF) 6.5.x drops large alerts when SNMP is used as the transport, which could prevent some alerts from being sent in the event of an attack. El demonio (daemon) de Symantec Enterprise Firewall 6.5.x deja caer importantes alertas cuando se usa SNMP como transporte, lo que podría impedir que algunas alertas se enviasen en caso de ataque. • http://marc.info/?l=bugtraq&m=101424225814604&w=2 •