
CVE-2019-6140
https://notcve.org/view.php?id=CVE-2019-6140
09 Apr 2019 — A configuration issue has been discovered in Forcepoint Email Security 8.4.x and 8.5.x: the product is left in a vulnerable state if the hybrid registration process is not completed. Se ha detectado un problema de configuración en Forcepoint Email Security versiones 8.4. x y 8.5. x: el producto se deja en un estado vulnerable si el proceso de registro híbrido no es completado • https://help.forcepoint.com/security/CVE/CVE-2019-6140.html • CWE-284: Improper Access Control •

CVE-2018-16530
https://notcve.org/view.php?id=CVE-2018-16530
09 Apr 2019 — A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation. Un desbordamiento de búfer en región stack de la memoria en Forcepoint Email Security ve... • https://help.forcepoint.com/security/CVE/CVE-2018-16530.html • CWE-787: Out-of-bounds Write •

CVE-2018-16529
https://notcve.org/view.php?id=CVE-2018-16529
28 Mar 2019 — A password reset vulnerability has been discovered in Forcepoint Email Security 8.5.x. The password reset URL can be used after the intended expiration period or after the URL has already been used to reset a password. Se ha descubierto una vulnerabilidad de restablecimiento de contraseña en Forcepoint Email Security 8.5.x. La URL de restablecimiento de contraseña puede utilizarse después del periodo de expiración intencionado o después de que la contraseña se haya utilizado para restablecer una contraseña. • https://help.forcepoint.com/security/CVE/CVE-2018-16529.html • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVE-2019-6139
https://notcve.org/view.php?id=CVE-2019-6139
07 Feb 2019 — Forcepoint User ID (FUID) server versions up to 1.2 have a remote arbitrary file upload vulnerability on TCP port 5001. Successful exploitation of this vulnerability may lead to remote code execution. To fix this vulnerability, upgrade to FUID version 1.3 or higher. To prevent the vulnerability on FUID versions 1.2 and below, apply local firewall rules on the FUID server to disable all external access to port TCP/5001. FUID requires this port only for local connections through the loopback interface. • https://help.forcepoint.com/security/CVE/CVE-2019-6139.html • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2004-0112
https://notcve.org/view.php?id=CVE-2004-0112
18 Mar 2004 — The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read. El código que une SSL/TLS en OpenSSL 0.9.7a, 0.9.7b y 0.9.7c, usando Kerberos, no comprueba adecuadamente la longitud de los tickets de Kerberos, lo que permite que atacantes remotos provoquen una dene... • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc • CWE-125: Out-of-bounds Read •