CVE-2005-0817
https://notcve.org/view.php?id=CVE-2005-0817
Unknown vulnerability in the DNSd proxy, as used in Symantec Gateway Security 5400 2.x and 5300 1.x, Enterprise Firewall 7.0.x and 8.x, and VelociRaptor 1100/1200/1300 1.5, allows remote attackers to poison the DNS cache and redirect users to malicious sites. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0225.html http://secunia.com/advisories/14595 http://securityresponse.symantec.com/avcenter/security/Content/2005.03.15.html http://securitytracker.com/id?1013451 http://www.isc.sans.org/diary.php?date=2005-03-04 https://exchange.xforce.ibmcloud.com/vulnerabilities/16423 https://exchange.xforce.ibmcloud.com/vulnerabilities/44530 •
CVE-2005-0618
https://notcve.org/view.php?id=CVE-2005-0618
The SMTP binding function in Symantec Firewall/VPN Appliance 200/200R firmware after 1.5Z and before 1.68, Gateway Security 360/360R and 460/460R firmware before vuild 858, and Nexland Pro800turbo, when configured for load balancing between two WANs, might send SMTP traffic to a trusted network through an untrusted network. • http://secunia.com/advisories/14428 http://securityresponse.symantec.com/avcenter/security/Content/2005.02.28.html •
CVE-2005-0249
https://notcve.org/view.php?id=CVE-2005-0249
Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header. • http://securitytracker.com/id?1013133 http://www.kb.cert.org/vuls/id/107822 http://www.symantec.com/avcenter/security/Content/2005.02.08.html http://xforce.iss.net/xforce/alerts/id/187 https://exchange.xforce.ibmcloud.com/vulnerabilities/18869 •
CVE-2004-1474
https://notcve.org/view.php?id=CVE-2004-1474
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file. • http://marc.info/?l=bugtraq&m=109588376426070&w=2 http://secunia.com/advisories/12635 http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html http://www.kb.cert.org/vuls/id/173910 http://www.osvdb.org/10206 http://www.securityfocus.com/bid/11237 https://exchange.xforce.ibmcloud.com/vulnerabilities/17471 •
CVE-2004-1473
https://notcve.org/view.php?id=CVE-2004-1473
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53. • http://marc.info/?l=bugtraq&m=109588376426070&w=2 http://secunia.com/advisories/12635 http://securityresponse.symantec.com/avcenter/security/Content/2004.09.22.html http://www.kb.cert.org/vuls/id/329230 http://www.osvdb.org/10205 http://www.securityfocus.com/bid/11237 https://exchange.xforce.ibmcloud.com/vulnerabilities/17470 •