9 results (0.003 seconds)

CVSS: 7.5EPSS: 2%CPEs: 11EXPL: 0

14 Sep 2002 — SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP before 7.2, (2) InterScan VirusWall before 3.52 build 1494, (3) the default configuration of MIMEDefang before 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2046 ("Message Fragmentation and Reassembly") and supported in such products as Outlook Express, which allows remote attackers to bypass content filtering, including virus checking, via fragmented emails of the message/partial content type... • http://archives.neohapsis.com/archives/bugtraq/2002-09/0134.html •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2001 — NAI WebShield SMTP 4.5 and possibly 4.5 MR1a does not filter improperly MIME encoded email attachments, which could allow remote attackers to bypass filtering and possibly execute arbitrary code in email clients that process the invalid attachments. • http://archives.neohapsis.com/archives/bugtraq/2001-11/0294.html •

CVSS: 9.8EPSS: 9%CPEs: 15EXPL: 0

04 Sep 2001 — Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. • ftp://patches.sgi.com/support/free/security/advisories/20011104-01-I • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 3

19 Dec 2000 — McAfee WebShield SMTP 4.5 allows remote attackers to cause a denial of service via a malformed recipient field. • https://www.exploit-db.com/exploits/20432 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

19 Dec 2000 — McAfee WebShield SMTP 4.5 allows remote attackers to bypass email content filtering rules by including Extended ASCII characters in name of the attachment. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0324.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

20 Oct 2000 — WebShield SMTP 4.5 allows remote attackers to cause a denial of service by sending e-mail with a From: address that has a . (period) at the end, which causes WebShield to continuously send itself copies of the e-mail. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0101.html •

CVSS: 10.0EPSS: 7%CPEs: 7EXPL: 1

18 May 2000 — Buffer overflow in the CyberPatrol daemon "cyberdaemon" used in gauntlet and WebShield allows remote attackers to cause a denial of service or execute arbitrary commands. • https://www.exploit-db.com/exploits/19949 •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

01 May 2000 — Buffer overflow in WebShield SMTP 4.5.44 allows remote attackers to execute arbitrary commands via a long configuration parameter to the WebShield remote management service. • http://www.osvdb.org/327 •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

01 May 2000 — The WebShield SMTP Management Tool version 4.5.44 does not properly restrict access to the management port when an IP address does not resolve to a hostname, which allows remote attackers to access the configuration via the GET_CONFIG command. • http://www.osvdb.org/326 •