Page 5 of 24 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The WebShield SMTP Management Tool version 4.5.44 does not properly restrict access to the management port when an IP address does not resolve to a hostname, which allows remote attackers to access the configuration via the GET_CONFIG command. • http://www.osvdb.org/326 http://www.securityfocus.com/bid/1253 http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A%40exchange.servers.delphis.net •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in WebShield SMTP 4.5.44 allows remote attackers to execute arbitrary commands via a long configuration parameter to the WebShield remote management service. • http://www.osvdb.org/327 http://www.securityfocus.com/bid/1254 http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A%40exchange.servers.delphis.net •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

Denial of service in Gauntlet Firewall via a malformed ICMP packet. • https://www.exploit-db.com/exploits/19441 http://www.osvdb.org/1029 http://www.securityfocus.com/bid/556 •

CVSS: 5.1EPSS: 1%CPEs: 1EXPL: 0

NAI VirusScan NT 4.0.2 does not properly modify the scan.dat virus definition file during an update via FTP, but it reports that the update was successful, which could cause a system administrator to believe that the definitions have been updated correctly. • http://marc.info/?l=bugtraq&m=92588169005196&w=2 http://marc.info/?l=ntbugtraq&m=92587579032534&w=2 http://www.securityfocus.com/bid/169 •