7 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Admin Console in Secure Computing Corporation Sidewinder G2 6.1.0.01 exports private keys when exporting firewall certificates, which might allow attackers to obtain sensitive information. • http://www.osvdb.org/6235 http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/24364 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Secure Computing Corporation Sidewinder G2 6.1.0.01 allows remote attackers to cause a denial of service (CPU consumption) via delayed responses to DNS queries. • http://www.osvdb.org/6231 http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 0

Secure Computing Corporation Sidewinder G2 6.1.0.01 might allow remote attackers to cause a denial of service (proxy failure) via invalid traffic to the (1) T.120 or (2) RTSP proxy, or (3) invalid MIME messages to the mail filter. NOTE: this might not be a vulnerability because the embedded monitoring sub-system automatically restarts after the failure. • http://secunia.com/advisories/11632 http://www.osvdb.org/6232 http://www.osvdb.org/6233 http://www.osvdb.org/6234 http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/16183 https://exchange.xforce.ibmcloud.com/vulnerabilities/16184 https://exchange.xforce.ibmcloud.com/vulnerabilities/16186 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Secure Computing Corporation Sidewinder G2 6.1.0.01 allows remote attackers to cause a denial of service (SMTP proxy failure) via unknown attack vendors involving an "extremely busy network." NOTE: this might not be a vulnerability because the embedded monitoring sub-system automatically restarts after the failure. • http://secunia.com/advisories/11632 http://www.osvdb.org/6236 http://www.securecomputing.com/pdf/SW61002Rel_Notes_0512.pdf •

CVSS: 5.0EPSS: 0%CPEs: 252EXPL: 0

OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. OpenSSL 0.9.6 anteriores a la 0.9.6d no manejan adecuadamente los tipos de mensajes desconocidos, lo que permite a atacantes remotos causar una denegación de servicios (por bucle infinito), como se demuestra utilizando la herramienta de testeo Codenomicon TLS. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834 http://fedoranews.org/updates/FEDORA-2004-095.shtml http://marc.info/?l=bugtraq&m=107955049331965&w=2 http://marc.info/?l=bugtraq&m=108403850228012&w=2 http://rhn.redhat.com/errata/RHSA-2004-119.html http://secunia.com/advisories/11139 http://security.gen •