8 results (0.009 seconds)

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

20 Mar 2005 — Unknown vulnerability in the DNSd proxy, as used in Symantec Gateway Security 5400 2.x and 5300 1.x, Enterprise Firewall 7.0.x and 8.x, and VelociRaptor 1100/1200/1300 1.5, allows remote attackers to poison the DNS cache and redirect users to malicious sites. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0225.html •

CVSS: 9.8EPSS: 8%CPEs: 9EXPL: 0

31 Dec 2004 — Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload. • http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html •

CVSS: 7.5EPSS: 9%CPEs: 13EXPL: 1

09 Jun 2003 — Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections. Symantec Raptor Firewall 6.5 y 6.5.3, Enterprise Firewall 6.5.2 y 7.0, VelociRaptor modelos 500/700/1000 y 1100/1200/1300, y Gateway Security 5110/5200/5300 generan secuencias numéricas iniciales (ISN) fácilmente predecibles, lo que per... • https://www.exploit-db.com/exploits/19522 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

27 Mar 2003 — The HTTP proxy for Symantec Enterprise Firewall (SEF) 7.0 allows proxy users to bypass pattern matching for blocked URLs via requests that are URL-encoded with escapes, Unicode, or UTF-8. El proxy HTTP de Symantec Enterprise Firewall (SEF) 7.0 permite a usuarios del proxy evitar la comprobación de patrones de URLs bloqueadas mediante peticiones codificadas en la URL con escapes, Unicode, o UTF-8. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0152.html •

CVSS: 7.5EPSS: 1%CPEs: 14EXPL: 0

31 Dec 2002 — Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd). • http://www.securityfocus.com/bid/6389 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 14EXPL: 0

28 Oct 2002 — The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout. El componente de proxy web en Symantec Enterprise Firewall (SEF) 6.5.2 a 7.0, Raptor Firewall 6.5 y 6.5.3, VelociRaptor, y Symantec Gateway Sec... • http://marc.info/?l=bugtraq&m=103463869503124&w=2 •

CVSS: 8.2EPSS: 1%CPEs: 7EXPL: 0

03 Jul 2002 — FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0166.html •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

31 May 2002 — The Notify daemon for Symantec Enterprise Firewall (SEF) 6.5.x drops large alerts when SNMP is used as the transport, which could prevent some alerts from being sent in the event of an attack. El demonio (daemon) de Symantec Enterprise Firewall 6.5.x deja caer importantes alertas cuando se usa SNMP como transporte, lo que podría impedir que algunas alertas se enviasen en caso de ataque. • http://marc.info/?l=bugtraq&m=101424225814604&w=2 •