Filtered by vendor Broadcom
Subscriptions
Filtered by product Symantec Messaging Gateway
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-23614 | 1 Broadcom | 1 Symantec Messaging Gateway | 2024-09-05 | 10 Critical |
A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root. | ||||
CVE-2014-0160 | 13 Broadcom, Canonical, Debian and 10 more | 37 Symantec Messaging Gateway, Ubuntu Linux, Debian Linux and 34 more | 2024-08-06 | 7.5 High |
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. | ||||
CVE-2020-12594 | 1 Broadcom | 1 Symantec Messaging Gateway | 2024-08-04 | 7.2 High |
A privilege escalation flaw allows a malicious, authenticated, privileged CLI user to escalate their privileges on the system and gain full control over the SMG appliance. This affects SMG prior to 10.7.4. | ||||
CVE-2020-12595 | 1 Broadcom | 1 Symantec Messaging Gateway | 2024-08-04 | 4.9 Medium |
An information disclosure flaw allows a malicious, authenticated, privileged web UI user to obtain a password for a remote SCP backup server that they might not otherwise be authorized to access. This affects SMG prior to 10.7.4. | ||||
CVE-2021-30651 | 1 Broadcom | 1 Symantec Messaging Gateway | 2024-08-03 | 4.9 Medium |
A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access. | ||||
CVE-2024-23615 | 1 Broadcom | 1 Symantec Messaging Gateway | 2024-08-01 | 10 Critical |
A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root. |
Page 1 of 1.