cpe:2.3:a:symantec:brightmail_antispam:6.0.1:*:*:*:*:*:*:*
The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header.
Max CVSS
9.3
EPSS Score
4.40%
Published
2007-10-05
Updated
2012-10-31
Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives.
Max CVSS
9.3
EPSS Score
18.16%
Published
2007-10-05
Updated
2012-10-31
Symantec Brightmail AntiSpam (SBAS) before 6.0.4, when the Control Center is allowed to connect from any computer, allows remote attackers to cause a denial of service (application freeze) "by sending invalid posts".
Max CVSS
5.0
EPSS Score
0.60%
Published
2006-08-07
Updated
2011-03-08
Multiple directory traversal vulnerabilities in Symantec Brightmail AntiSpam (SBAS) before 6.0.4, when the Control Center is allowed to connect from any computer, allow remote attackers to read and overwrite certain files via directory traversal sequences in (1) DATABLOB-GET and (2) DATABLOB-SAVE requests.
Max CVSS
7.6
EPSS Score
21.26%
Published
2006-08-07
Updated
2017-07-20
Symantec Brightmail AntiSpam 6.0 build 1 and 2 allows remote attackers to cause a denial of service (bmserver component termination) via malformed MIME messages.
Max CVSS
5.0
EPSS Score
0.43%
Published
2005-12-31
Updated
2011-03-08
Symantec Brightmail AntiSpam before 6.0.2 has a hard-coded database administrator password, which allows remote attackers to gain privileges.
Max CVSS
7.5
EPSS Score
3.60%
Published
2005-06-09
Updated
2017-07-11
The character converters in the Spamhunter and Language ID modules for Symantec Brightmail AntiSpam 6.0.1 before patch 132 allow remote attackers to cause a denial of service (crash) via messages with the ISO-8859-10 character set, which is not recognized by the converters.
Max CVSS
5.0
EPSS Score
0.18%
Published
2004-12-17
Updated
2017-07-11
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!