8 results (0.016 seconds)

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 0

25 Jan 2024 — A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root. Existe una vulnerabilidad de desbordamiento de búfer en las versiones 10.5 y anteriores de Symantec Messaging Gateway. Un atacante remoto y anónimo puede aprovechar esta vulnerabilidad para lograr la ejecución remota de código como root. • https://blog.exodusintel.com/2024/01/25/symantec-messaging-gateway-libdec2lha-so-stack-buffer-overflow-remote-code-execution • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

25 Jan 2024 — A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root. Existe una vulnerabilidad de desbordamiento de búfer en las versiones 9.5 y anteriores de Symantec Messaging Gateway. Un atacante remoto y anónimo puede aprovechar esta vulnerabilidad para lograr la ejecución remota de código como root. • https://blog.exodusintel.com/2024/01/25/symantec-messaging-gateway-stack-buffer-overflow-remote-code-execution • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

24 Jun 2022 — A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access. Un usuario administrador de SMG autenticado y malicioso puede obtener las contraseñas de servidores LDAP/Active Directory externos a los que, de otro modo, no estaría autorizado a acceder • https://support.broadcom.com/external/content/SecurityAdvisories/0/20652 •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

10 Dec 2020 — An information disclosure flaw allows a malicious, authenticated, privileged web UI user to obtain a password for a remote SCP backup server that they might not otherwise be authorized to access. This affects SMG prior to 10.7.4. Un fallo en la divulgación de información permite a un usuario de Interfaz de Usuario web privilegiado, autenticado y malicioso obtener una contraseña para un servidor de respaldo SCP remoto al que de otra manera no estaría autorizado en acceder. Esto afecta a SMG versiones an... • https://support.broadcom.com/security-advisory/content/security-advisories/Privilege-Escalation-and-Information-Disclosure-Vulnerabilities-in-SMG/SYMSA16609 •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

10 Dec 2020 — A privilege escalation flaw allows a malicious, authenticated, privileged CLI user to escalate their privileges on the system and gain full control over the SMG appliance. This affects SMG prior to 10.7.4. Un fallo de escalada de privilegios permite a un usuario CLI privilegiado, autenticado y malicioso escalar sus privilegios en el sistema y conseguir control total sobre el dispositivo SMG. Esto afecta a SMG versiones anteriores a 10.7.4. • https://support.broadcom.com/security-advisory/content/security-advisories/Privilege-Escalation-and-Information-Disclosure-Vulnerabilities-in-SMG/SYMSA16609 •

CVSS: 5.5EPSS: 7%CPEs: 43EXPL: 2

14 Apr 2017 — The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec ... • https://www.exploit-db.com/exploits/40405 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 9%CPEs: 43EXPL: 2

14 Apr 2017 — The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec ... • https://www.exploit-db.com/exploits/40405 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 94%CPEs: 54EXPL: 84

07 Apr 2014 — The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. Las implementaciones de (1) TLS y (2) DTLS en OpenSSL 1.0.1 en versiones anteriores a 1.0.1g no manejan adecuadamente paquetes Heartbeat Extension, lo qu... • https://packetstorm.news/files/id/180746 • CWE-125: Out-of-bounds Read CWE-201: Insertion of Sensitive Information Into Sent Data •