Page 2 of 18 results (0.005 seconds)

CVSS: 7.5EPSS: 9%CPEs: 13EXPL: 1

09 Jun 2003 — Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections. Symantec Raptor Firewall 6.5 y 6.5.3, Enterprise Firewall 6.5.2 y 7.0, VelociRaptor modelos 500/700/1000 y 1100/1200/1300, y Gateway Security 5110/5200/5300 generan secuencias numéricas iniciales (ISN) fácilmente predecibles, lo que per... • https://www.exploit-db.com/exploits/19522 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

27 Mar 2003 — The HTTP proxy for Symantec Enterprise Firewall (SEF) 7.0 allows proxy users to bypass pattern matching for blocked URLs via requests that are URL-encoded with escapes, Unicode, or UTF-8. El proxy HTTP de Symantec Enterprise Firewall (SEF) 7.0 permite a usuarios del proxy evitar la comprobación de patrones de URLs bloqueadas mediante peticiones codificadas en la URL con escapes, Unicode, o UTF-8. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0152.html •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

18 Mar 2003 — Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote attackers to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present. Secure Webserver 1.1 en Raptor 6.5 y Symantec Enterprise Firewall 6.5.2 permite a atacantes remotos la identificación de direcciones IP de equipos en red mediante una petición CONNECT, que genera un mensajes de error distinto en caso de que el equipo este presente. • http://archives.neohapsis.com/archives/bugtraq/2002-10/0190.html •

CVSS: 7.5EPSS: 1%CPEs: 14EXPL: 0

31 Dec 2002 — Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd). • http://www.securityfocus.com/bid/6389 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 14EXPL: 0

28 Oct 2002 — The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout. El componente de proxy web en Symantec Enterprise Firewall (SEF) 6.5.2 a 7.0, Raptor Firewall 6.5 y 6.5.3, VelociRaptor, y Symantec Gateway Sec... • http://marc.info/?l=bugtraq&m=103463869503124&w=2 •

CVSS: 8.2EPSS: 1%CPEs: 7EXPL: 0

03 Jul 2002 — FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0166.html •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

31 May 2002 — SMTP proxy in Symantec Enterprise Firewall (SEF) 6.5.x includes the firewall's physical interface name and address in an SMTP protocol exchange when NAT translation is made to an address other than the firewall, which could allow remote attackers to determine certain firewall configuration information. El proxy SMTP en Symantec Enterprise Firewall 6.5.x incluye el nombre y la dirección del interfaz físico del cortafuegos en un intercambio de mensajes SMTP cuando la traduzzión NAT (network address translatio... • http://marc.info/?l=bugtraq&m=101424307617060&w=2 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

31 May 2002 — The Notify daemon for Symantec Enterprise Firewall (SEF) 6.5.x drops large alerts when SNMP is used as the transport, which could prevent some alerts from being sent in the event of an attack. El demonio (daemon) de Symantec Enterprise Firewall 6.5.x deja caer importantes alertas cuando se usa SNMP como transporte, lo que podría impedir que algunas alertas se enviasen en caso de ataque. • http://marc.info/?l=bugtraq&m=101424225814604&w=2 •