Broadcom

Symantec Messaging Gateway

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.13%
  • Published 26.01.2024 00:15:08
  • Last modified 21.11.2024 08:58:00

A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.

  • EPSS 6.3%
  • Published 26.01.2024 00:15:08
  • Last modified 21.11.2024 08:58:00

A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.

  • EPSS 0.3%
  • Published 24.06.2022 15:15:09
  • Last modified 21.11.2024 06:04:21

A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access.

  • EPSS 0.3%
  • Published 10.12.2020 06:15:13
  • Last modified 21.11.2024 04:59:54

An information disclosure flaw allows a malicious, authenticated, privileged web UI user to obtain a password for a remote SCP backup server that they might not otherwise be authorized to access. This affects SMG prior to 10.7.4.

  • EPSS 0.53%
  • Published 10.12.2020 06:15:12
  • Last modified 21.11.2024 04:59:53

A privilege escalation flaw allows a malicious, authenticated, privileged CLI user to escalate their privileges on the system and gain full control over the SMG appliance. This affects SMG prior to 10.7.4.

Warning Exploit
  • EPSS 94.48%
  • Published 07.04.2014 22:55:03
  • Last modified 12.04.2025 10:46:40

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer ov...