8 results (0.002 seconds)

CVSS: 5.0EPSS: 41%CPEs: 5EXPL: 0

Unknown vulnerability in the DNSd proxy, as used in Symantec Gateway Security 5400 2.x and 5300 1.x, Enterprise Firewall 7.0.x and 8.x, and VelociRaptor 1100/1200/1300 1.5, allows remote attackers to poison the DNS cache and redirect users to malicious sites. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0225.html http://secunia.com/advisories/14595 http://securityresponse.symantec.com/avcenter/security/Content/2005.03.15.html http://securitytracker.com/id?1013451 http://www.isc.sans.org/diary.php?date=2005-03-04 https://exchange.xforce.ibmcloud.com/vulnerabilities/16423 https://exchange.xforce.ibmcloud.com/vulnerabilities/44530 •

CVSS: 7.5EPSS: 12%CPEs: 9EXPL: 0

Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload. • http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html http://www.auscert.org.au/render.html?it=4339 http://www.ciac.org/ciac/bulletins/o-206.shtml http://www.securityfocus.com/bid/11039 http://xforce.iss.net/xforce/alerts/id/181 https://exchange.xforce.ibmcloud.com/vulnerabilities/15669 •

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 1

Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections. Symantec Raptor Firewall 6.5 y 6.5.3, Enterprise Firewall 6.5.2 y 7.0, VelociRaptor modelos 500/700/1000 y 1100/1200/1300, y Gateway Security 5110/5200/5300 generan secuencias numéricas iniciales (ISN) fácilmente predecibles, lo que permitiría a atacantes remotos falsear conexiones. • https://www.exploit-db.com/exploits/19522 http://archives.neohapsis.com/archives/bugtraq/2002-07/0492.html http://www.osvdb.org/855 http://www.securityfocus.com/bid/5387 http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html https://exchange.xforce.ibmcloud.com/vulnerabilities/12836 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The HTTP proxy for Symantec Enterprise Firewall (SEF) 7.0 allows proxy users to bypass pattern matching for blocked URLs via requests that are URL-encoded with escapes, Unicode, or UTF-8. El proxy HTTP de Symantec Enterprise Firewall (SEF) 7.0 permite a usuarios del proxy evitar la comprobación de patrones de URLs bloqueadas mediante peticiones codificadas en la URL con escapes, Unicode, o UTF-8. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0152.html http://marc.info/?l=bugtraq&m=104869513822233&w=2 http://marc.info/?l=ntbugtraq&m=104868285106289&w=2 http://service1.symantec.com/SUPPORT/ent-gate.nsf/docid/2003032507434754 http://www.securityfocus.com/bid/7196 •

CVSS: 5.0EPSS: 0%CPEs: 14EXPL: 0

Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd). • http://www.securityfocus.com/bid/6389 http://www.symantec.com/avcenter/security/Content/2002.12.12.html https://exchange.xforce.ibmcloud.com/vulnerabilities/10862 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •