Page 4 of 18 results (0.004 seconds)

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

A stack-based buffer overflow in Forcepoint Email Security version 8.5 allows an attacker to craft malicious input and potentially crash a process creating a denial-of-service. While no known Remote Code Execution (RCE) vulnerabilities exist, as with all buffer overflows, the possibility of RCE cannot be completely ruled out. Data Execution Protection (DEP) is already enabled on the Email appliance as a risk mitigation. Un desbordamiento de búfer en región stack de la memoria en Forcepoint Email Security versión 8.5 permite a un atacante crear una entrada maliciosa y potencialmente bloquear un proceso creando una denegación de servicio (DoS). Si bien no se conocen vulnerabilidades de Remote Code Execution (RCE), como con todos los desbordamientos de búfer, no se puede descartar completamente la posibilidad de que RCE se ejecute. • https://help.forcepoint.com/security/CVE/CVE-2018-16530.html https://support.forcepoint.com/KBArticle?id=000016621 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A password reset vulnerability has been discovered in Forcepoint Email Security 8.5.x. The password reset URL can be used after the intended expiration period or after the URL has already been used to reset a password. Se ha descubierto una vulnerabilidad de restablecimiento de contraseña en Forcepoint Email Security 8.5.x. La URL de restablecimiento de contraseña puede utilizarse después del periodo de expiración intencionado o después de que la contraseña se haya utilizado para restablecer una contraseña. • https://help.forcepoint.com/security/CVE/CVE-2018-16529.html https://seclists.org/fulldisclosure/2018/Nov/23 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVSS: 5.0EPSS: 6%CPEs: 2EXPL: 3

The Web Administrator service (STEMWADM.EXE) in Websense Personal Email Manager 7.1 before Hotfix 4 and Email Security 7.1 before Hotfix 4 allows remote attackers to cause a denial of service (crash) by sending a HTTP GET request to TCP port 8181 and closing the socket before the service can send a response. El Web Administrator service (STEMWADM.EXE) en Websense Personal Email Manager v7.1 anterior Hotfix v4 y Email Security v7.1 anterior Hotfix v4 permite a atacantes remotos causar una denegación de servicio (caída) enviando una petición HTTP GET en el puerto TCP 8181 y cerrando el socket antes de que el servicio pueda enviar la respuesta. • https://www.exploit-db.com/exploits/9980 http://kb.websense.com/article.aspx?article=4786&p=12 http://kb.websense.com/display/4/kb/article.aspx?aid=4786 http://secunia.com/advisories/37091 http://sotiriu.de/adv/NSOADV-2009-002.txt http://www.securityfocus.com/archive/1/507329/100/0/threaded http://www.securityfocus.com/bid/36740 http://www.vupen.com/english/advisories/2009/2987 •