Page 3 of 14 results (0.004 seconds)

CVSS: 5.0EPSS: 43%CPEs: 2EXPL: 3

Directory traversal vulnerability in img.pl in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to read arbitrary files via a .. (dot dot) in the f parameter. • https://www.exploit-db.com/exploits/1236 http://marc.info/?l=bugtraq&m=112560044813390&w=2 http://secunia.com/advisories/16683 http://securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1 http://www.securityfocus.com/bid/14710 http://www.securitytracker.com/alerts/2005/Sep/1014837.html https://exchange.xforce.ibmcloud.com/vulnerabilities/22120 •

CVSS: 7.5EPSS: 96%CPEs: 2EXPL: 5

img.pl in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to execute arbitrary commands via shell metacharacters in the f parameter. • https://www.exploit-db.com/exploits/16893 https://www.exploit-db.com/exploits/1236 http://marc.info/?l=bugtraq&m=112560044813390&w=2 http://secunia.com/advisories/16683 http://www.securityfocus.com/bid/14712 http://www.securitytracker.com/alerts/2005/Sep/1014837.html http://www.securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1 http://www.nessus.org/plugins/index.php?view=single&id=19556 •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

Argument injection vulnerability in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to (1) read portions of source code via the -f option to Dig (dig_device.cgi), (2) determine file existence via the -r argument to Tcpdump (tcpdump_device.cgi) or (3) modify files in the cgi-bin directory via the -w argument to Tcpdump. • http://marc.info/?l=bugtraq&m=112560044813390&w=2 http://secunia.com/advisories/16683 http://securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1 http://www.securitytracker.com/alerts/2005/Sep/1014837.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Barracuda Spam Firewall 3.1.10 and earlier does not restrict the domains that white-listed domains can send mail to, which allows members of white-listed domains to use Barracuda as an open mail relay for spam. • http://marc.info/?l=bugtraq&m=110805534732492&w=2 http://secunia.com/advisories/14243 https://exchange.xforce.ibmcloud.com/vulnerabilities/19283 •