Vulnerabilities > Broadcom > Symantec Messaging Gateway
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-01-26 | CVE-2024-23614 | Classic Buffer Overflow vulnerability in Broadcom Symantec Messaging Gateway 9.5 A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before. | 9.8 |
2024-01-26 | CVE-2024-23615 | Classic Buffer Overflow vulnerability in Broadcom Symantec Messaging Gateway 10.5/9.5 A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. | 9.8 |
2022-06-24 | CVE-2021-30651 | Unspecified vulnerability in Broadcom Symantec Messaging Gateway 10.7/10.7.4 A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access. | 4.9 |
2020-12-10 | CVE-2020-12595 | Unspecified vulnerability in Broadcom Symantec Messaging Gateway 10.5/10.7/9.5 An information disclosure flaw allows a malicious, authenticated, privileged web UI user to obtain a password for a remote SCP backup server that they might not otherwise be authorized to access. | 4.9 |
2020-12-10 | CVE-2020-12594 | Unspecified vulnerability in Broadcom Symantec Messaging Gateway 10.5/10.7/9.5 A privilege escalation flaw allows a malicious, authenticated, privileged CLI user to escalate their privileges on the system and gain full control over the SMG appliance. | 7.2 |
2014-04-07 | CVE-2014-0160 | Out-of-bounds Read vulnerability in multiple products The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. | 7.5 |