Page 6 of 27 results (0.005 seconds)

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

Argument injection vulnerability in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to (1) read portions of source code via the -f option to Dig (dig_device.cgi), (2) determine file existence via the -r argument to Tcpdump (tcpdump_device.cgi) or (3) modify files in the cgi-bin directory via the -w argument to Tcpdump. • http://marc.info/?l=bugtraq&m=112560044813390&w=2 http://secunia.com/advisories/16683 http://securiweb.net/wiki/Ressources/AvisDeSecurite/2005.1 http://www.securitytracker.com/alerts/2005/Sep/1014837.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Barracuda Spam Firewall 3.1.10 and earlier does not restrict the domains that white-listed domains can send mail to, which allows members of white-listed domains to use Barracuda as an open mail relay for spam. • http://marc.info/?l=bugtraq&m=110805534732492&w=2 http://secunia.com/advisories/14243 https://exchange.xforce.ibmcloud.com/vulnerabilities/19283 •