Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
symantec gateway security 1.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE_2022_40684
Official Writeup - Simple CTF 2.0 Created: April 23, 2024 7:50 PM Today I completed an other room on TryHackMe with a simple file-upload vulnerability which I built. I have tried for dancing around this whole CTF machine and getting a lot of walls of challenges in the end it co...
1 Github repository
NA
CVE-2006-4562
The proxy DNS service in Symantec Gateway Security (SGS) allows remote malicious users to make arbitrary DNS queries to third-party DNS servers, while hiding the source IP address of the attacker. NOTE: another researcher has stated that the default configuration does not proxy D...
Symantec Gateway Security 5310 1.0
Symantec Gateway Security 5400 2.0.1
Symantec Gateway Security 5110
Symantec Gateway Security 5200 1.0
Symantec Gateway Security 360
Symantec Gateway Security 5300
Symantec Gateway Security 320
Symantec Gateway Security 360r
Symantec Gateway Security 1.0
Symantec Gateway Security 5400 2.0
Symantec Gateway Security 5000 Series 2.0.1
Symantec Gateway Security 5000 Series 3.0
Symantec Gateway Security 5200
Symantec Gateway Security 5300 1.0
Symantec Gateway Security 5110 1.0
NA
CVE-2005-3768
Buffer overflow in the Internet Key Exchange version 1 (IKEv1) implementation in Symantec Dynamic VPN Services, as used in Enterprise Firewall, Gateway Security, and Firewall /VPN Appliance products, allows remote malicious users to cause a denial of service and possibly execute ...
Symantec Enterprise Firewall 8.0
Symantec Gateway Security 5300 1.0
Symantec Gateway Security 5310 1.0
Symantec Firewall Vpn Appliance 100
Symantec Gateway Security 5400 2.0.1
Symantec Firewall Vpn Appliance 200
Symantec Gateway Security 300 2.0
Symantec Gateway Security 400 2.0
Symantec Gateway Security 5000 Series 3.0
Symantec Gateway Security 5100
NA
CVE-2005-0817
Unknown vulnerability in the DNSd proxy, as used in Symantec Gateway Security 5400 2.x and 5300 1.x, Enterprise Firewall 7.0.x and 8.x, and VelociRaptor 1100/1200/1300 1.5, allows remote malicious users to poison the DNS cache and redirect users to malicious sites.
Symantec Velociraptor Model 1300
Symantec Enterprise Firewall 7.0
Symantec Enterprise Firewall 8.0
Symantec Gateway Security 5300 1.0
Symantec Gateway Security 5400 2.0
NA
CVE-2005-0249
Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote malicious users to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header.
Symantec Client Security 1.0.1 Build 8.01.464
Symantec Client Security 1.0.1 Build 8.01.471
Symantec Client Security 1.1.1 Mr1 Build 8.1.1.314a
Symantec Client Security 1.1.1 Mr2 Build 8.1.1.319
Symantec Norton Antivirus 8.1.1.323
Symantec Norton Antivirus 8.1.1.329
Symantec Norton Antivirus 8.1.1 Build8.1.1.314a
Symantec Norton Antivirus 8.01.434
Symantec Web Security 3.01.59
Symantec Web Security 3.01.60
Symantec Web Security 3.01.61
Symantec Web Security 3.01.62
Symantec Client Security 1.0.1 Build 8.01.446
Symantec Client Security 1.0.1 Build 8.01.460
Symantec Client Security 1.1.1 Mr3 Build 8.1.1.323
Symantec Client Security 1.1.1 Mr5 Build 8.1.1.336
Symantec Gateway Security 2.0
Symantec Mail Security 4.1
Symantec Norton Antivirus 2.18 Build 83
Symantec Norton Antivirus 8.01.446
Symantec Norton Antivirus 8.01.460
Symantec Sav Filter Domino Nt Ports Build3.0.5
NA
CVE-2004-0369
Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 up to and including 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote malicious users to execute arbitrary code via a crafted ISAKMP payload.
Symantec Velociraptor 1.5
Symantec Enterprise Firewall 7.0.4
Symantec Enterprise Firewall 7.0
Entrust Entrust Libkmp Isakmp Library
Symantec Enterprise Firewall 8.0
Symantec Gateway Security 5300 1.0
Symantec Gateway Security 5400 2.0
NA
CVE-2004-0081
OpenSSL 0.9.6 prior to 0.9.6d does not properly handle unknown message types, which allows remote malicious users to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1 \\(3.005\\)
Cisco Firewall Services Module
Cisco Firewall Services Module 1.1.2
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Hp Aaa Server
Cisco Ciscoworks Common Management Foundation 2.1
Cisco Ciscoworks Common Services 2.2
Avaya Sg208 4.4
Avaya Sg5 4.2
Avaya Sg5 4.3
Freebsd Freebsd 5.1
Hp Hp-ux 8.05
Openbsd Openbsd 3.3
Redhat Linux 8.0
Sco Openserver 5.0.6
Avaya Sg203 4.4
Avaya Sg208
Freebsd Freebsd 4.8
NA
CVE-2004-0112
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshak...
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 \\(3.005\\)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
7.5
CVSSv3
CVE-2004-0079
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 \\(3.005\\)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
NA
CVE-2002-0538
FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote malicious users to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability.
Symantec Enterprise Firewall 6.5.2
Symantec Enterprise Firewall 7.0
Symantec Raptor Firewall 6.5.3
Symantec Raptor Firewall 6.5
Symantec Velociraptor 1.x
Symantec Gateway Security 1.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started