Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
network associates vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0437
Buffer overflow in the CyberPatrol daemon "cyberdaemon" used in gauntlet and WebShield allows remote malicious users to cause a denial of service or execute arbitrary commands.
Network Associates Gauntlet Firewall 4.2
Network Associates Gauntlet Firewall 5.0
Network Associates Webshield 4.0
Network Associates Gauntlet Firewall 4.1
Network Associates Gauntlet Firewall 5.5
Network Associates Webshield E-ppliance 100.0
Network Associates Webshield E-ppliance 300.0
1 EDB exploit
NA
CVE-2000-0650
The default installation of VirusScan 4.5 and NetShield 4.5 has insecure permissions for the registry key that identifies the AutoUpgrade directory, which allows local users to execute arbitrary commands by replacing SETUP.EXE in that directory with a Trojan Horse.
Network Associates Virusscan 4.5
Network Associates Netshield 4.5
NA
CVE-2000-0740
Buffer overflow in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote malicious users to execute arbitrary commands via a long URL in the HTTPS port.
Network Associates Net Tools Pki Server 1.0hotfix1
Network Associates Net Tools Pki Server 1.0hotfix2
Network Associates Net Tools Pki Server 1.0
1 EDB exploit
NA
CVE-2000-0739
Directory traversal vulnerability in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote malicious users to read arbitrary files via a .. (dot dot) attack in an HTTPS request to the enrollment server.
Network Associates Net Tools Pki Server 1.0hotfix1
Network Associates Net Tools Pki Server 1.0hotfix2
Network Associates Net Tools Pki Server 1.0
1 EDB exploit
NA
CVE-2000-0741
Format string vulnerability in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote malicious users to execute arbitrary code via format strings in a URL with a .XUDA extension.
Network Associates Net Tools Pki Server 1.0hotfix1
Network Associates Net Tools Pki Server 1.0hotfix2
Network Associates Net Tools Pki Server 1.0
1 EDB exploit
NA
CVE-2001-1542
NAI WebShield SMTP 4.5 and possibly 4.5 MR1a does not filter improperly MIME encoded email attachments, which could allow remote malicious users to bypass filtering and possibly execute arbitrary code in email clients that process the invalid attachments.
Network Associates Webshield Smtp 4.5 Mr1a
Network Associates Webshield Smtp 4.5
NA
CVE-2001-1456
Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 up to and including 6.0 allows remote malicious users to execute arbitrary code via a crafted mail message.
Network Associates Gauntlet Firewall Unix 5.0
Mcafee Webshield Smtp 4.1
Network Associates Gauntlet Firewall 4.2
Pgp E-ppliance 300 2.0
Sgi Irix 6.4
Mcafee Webshield Smtp 4.0
Sgi Irix 6.3
Pgp E-ppliance 300 1.5
Pgp E-ppliance 300 1.0
Sgi Irix 6.5
Sgi Irix 6.2
Network Associates Gauntlet Firewall Unix 5.5
Network Associates Gauntlet Firewall Unix 6.0
Network Associates Mcafee E-ppliance 100 Series
Network Associates Mcafee E-ppliance 120 Series
NA
CVE-2000-0448
The WebShield SMTP Management Tool version 4.5.44 does not properly restrict access to the management port when an IP address does not resolve to a hostname, which allows remote malicious users to access the configuration via the GET_CONFIG command.
Network Associates Webshield 4.5.44
NA
CVE-2000-0447
Buffer overflow in WebShield SMTP 4.5.44 allows remote malicious users to execute arbitrary commands via a long configuration parameter to the WebShield remote management service.
Network Associates Webshield 4.5.44
NA
CVE-1999-1195
NAI VirusScan NT 4.0.2 does not properly modify the scan.dat virus definition file during an update via FTP, but it reports that the update was successful, which could cause a system administrator to believe that the definitions have been updated correctly.
Network Associates Virusscan 4.0.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »