Vulnerabilites related to symantec - gateway_security_5400
cve-2004-0192
Vulnerability from cvelistv5
Published
2004-03-04 05:00
Modified
2024-08-08 00:10
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Management Service for Symantec Gateway Security 2.0 allows remote attackers to steal cookies and hijack a management session via a /sgmi URL that contains malicious script, which is not quoted in the resulting error page.
References
http://www.securityfocus.com/bid/9755vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/15330vdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=107790684732458&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:10:03.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "9755",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/9755"
          },
          {
            "name": "symantecgateway-error-xss(15330)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15330"
          },
          {
            "name": "20040227 Symantec Gateway Security Management Service Cross Site Scripting",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=107790684732458\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-02-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Management Service for Symantec Gateway Security 2.0 allows remote attackers to steal cookies and hijack a management session via a /sgmi URL that contains malicious script, which is not quoted in the resulting error page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "9755",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/9755"
        },
        {
          "name": "symantecgateway-error-xss(15330)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15330"
        },
        {
          "name": "20040227 Symantec Gateway Security Management Service Cross Site Scripting",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=107790684732458\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0192",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Management Service for Symantec Gateway Security 2.0 allows remote attackers to steal cookies and hijack a management session via a /sgmi URL that contains malicious script, which is not quoted in the resulting error page."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "9755",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/9755"
            },
            {
              "name": "symantecgateway-error-xss(15330)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15330"
            },
            {
              "name": "20040227 Symantec Gateway Security Management Service Cross Site Scripting",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=107790684732458\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0192",
    "datePublished": "2004-03-04T05:00:00",
    "dateReserved": "2004-03-03T00:00:00",
    "dateUpdated": "2024-08-08T00:10:03.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-0447
Vulnerability from cvelistv5
Published
2007-10-05 21:00
Modified
2024-08-07 12:19
Severity ?
Summary
Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:19:30.204Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26053",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26053"
          },
          {
            "name": "ADV-2007-2508",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2508"
          },
          {
            "name": "36118",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36118"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html"
          },
          {
            "name": "24282",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24282"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "26053",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26053"
        },
        {
          "name": "ADV-2007-2508",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2508"
        },
        {
          "name": "36118",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36118"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html"
        },
        {
          "name": "24282",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24282"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0447",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26053",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26053"
            },
            {
              "name": "ADV-2007-2508",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2508"
            },
            {
              "name": "36118",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36118"
            },
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html"
            },
            {
              "name": "24282",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24282"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0447",
    "datePublished": "2007-10-05T21:00:00",
    "dateReserved": "2007-01-23T00:00:00",
    "dateUpdated": "2024-08-07T12:19:30.204Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0369
Vulnerability from cvelistv5
Published
2005-04-14 04:00
Modified
2024-08-08 00:17
Severity ?
Summary
Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload.
References
http://www.auscert.org.au/render.html?it=4339third-party-advisory, x_refsource_AUSCERT
https://exchange.xforce.ibmcloud.com/vulnerabilities/15669vdb-entry, x_refsource_XF
http://xforce.iss.net/xforce/alerts/id/181third-party-advisory, x_refsource_ISS
http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.htmlx_refsource_CONFIRM
http://www.ciac.org/ciac/bulletins/o-206.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
http://www.securityfocus.com/bid/11039vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:17:14.359Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ESB-2004.0538",
            "tags": [
              "third-party-advisory",
              "x_refsource_AUSCERT",
              "x_transferred"
            ],
            "url": "http://www.auscert.org.au/render.html?it=4339"
          },
          {
            "name": "isakmp-spi-size-bo(15669)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15669"
          },
          {
            "name": "20040826 Entrust LibKmp Library Buffer Overflow",
            "tags": [
              "third-party-advisory",
              "x_refsource_ISS",
              "x_transferred"
            ],
            "url": "http://xforce.iss.net/xforce/alerts/id/181"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html"
          },
          {
            "name": "O-206",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/o-206.shtml"
          },
          {
            "name": "11039",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11039"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-08-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ESB-2004.0538",
          "tags": [
            "third-party-advisory",
            "x_refsource_AUSCERT"
          ],
          "url": "http://www.auscert.org.au/render.html?it=4339"
        },
        {
          "name": "isakmp-spi-size-bo(15669)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15669"
        },
        {
          "name": "20040826 Entrust LibKmp Library Buffer Overflow",
          "tags": [
            "third-party-advisory",
            "x_refsource_ISS"
          ],
          "url": "http://xforce.iss.net/xforce/alerts/id/181"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html"
        },
        {
          "name": "O-206",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/o-206.shtml"
        },
        {
          "name": "11039",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11039"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0369",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ESB-2004.0538",
              "refsource": "AUSCERT",
              "url": "http://www.auscert.org.au/render.html?it=4339"
            },
            {
              "name": "isakmp-spi-size-bo(15669)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15669"
            },
            {
              "name": "20040826 Entrust LibKmp Library Buffer Overflow",
              "refsource": "ISS",
              "url": "http://xforce.iss.net/xforce/alerts/id/181"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html"
            },
            {
              "name": "O-206",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/o-206.shtml"
            },
            {
              "name": "11039",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11039"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0369",
    "datePublished": "2005-04-14T04:00:00",
    "dateReserved": "2004-03-24T00:00:00",
    "dateUpdated": "2024-08-08T00:17:14.359Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-3699
Vulnerability from cvelistv5
Published
2007-10-05 21:00
Modified
2024-08-07 14:28
Severity ?
Summary
The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:28:52.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26053",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26053"
          },
          {
            "name": "ADV-2007-2508",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2508"
          },
          {
            "name": "36119",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36119"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html"
          },
          {
            "name": "24282",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24282"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "26053",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26053"
        },
        {
          "name": "ADV-2007-2508",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2508"
        },
        {
          "name": "36119",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36119"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html"
        },
        {
          "name": "24282",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24282"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3699",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26053",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26053"
            },
            {
              "name": "ADV-2007-2508",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2508"
            },
            {
              "name": "36119",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36119"
            },
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html"
            },
            {
              "name": "24282",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24282"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3699",
    "datePublished": "2007-10-05T21:00:00",
    "dateReserved": "2007-07-11T00:00:00",
    "dateUpdated": "2024-08-07T14:28:52.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-3768
Vulnerability from cvelistv5
Published
2005-11-23 00:00
Modified
2024-08-07 23:24
Severity ?
Summary
Buffer overflow in the Internet Key Exchange version 1 (IKEv1) implementation in Symantec Dynamic VPN Services, as used in Enterprise Firewall, Gateway Security, and Firewall /VPN Appliance products, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
References
http://securitytracker.com/id?1015247vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/17684third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2517vdb-entry, x_refsource_VUPEN
http://securitytracker.com/id?1015249vdb-entry, x_refsource_SECTRACK
http://securityresponse.symantec.com/avcenter/security/Content/2005.11.21.htmlx_refsource_CONFIRM
http://securitytracker.com/id?1015248vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:24:36.178Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1015247",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015247"
          },
          {
            "name": "17684",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17684"
          },
          {
            "name": "ADV-2005-2517",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2517"
          },
          {
            "name": "1015249",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015249"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.21.html"
          },
          {
            "name": "1015248",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015248"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-11-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the Internet Key Exchange version 1 (IKEv1) implementation in Symantec Dynamic VPN Services, as used in Enterprise Firewall, Gateway Security, and Firewall /VPN Appliance products, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1015247",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015247"
        },
        {
          "name": "17684",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17684"
        },
        {
          "name": "ADV-2005-2517",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2517"
        },
        {
          "name": "1015249",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015249"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.21.html"
        },
        {
          "name": "1015248",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015248"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3768",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the Internet Key Exchange version 1 (IKEv1) implementation in Symantec Dynamic VPN Services, as used in Enterprise Firewall, Gateway Security, and Firewall /VPN Appliance products, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1015247",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015247"
            },
            {
              "name": "17684",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17684"
            },
            {
              "name": "ADV-2005-2517",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2517"
            },
            {
              "name": "1015249",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015249"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.21.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.21.html"
            },
            {
              "name": "1015248",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015248"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3768",
    "datePublished": "2005-11-23T00:00:00",
    "dateReserved": "2005-11-22T00:00:00",
    "dateUpdated": "2024-08-07T23:24:36.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-1029
Vulnerability from cvelistv5
Published
2004-11-24 05:00
Modified
2024-08-08 00:39
Severity ?
Summary
The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:39:00.544Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20041122 Sun Java Plugin Arbitrary Package Access Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=158\u0026type=vulnerabilities"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://jouko.iki.fi/adv/javaplugin.html"
          },
          {
            "name": "oval:org.mitre.oval:def:5674",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5674"
          },
          {
            "name": "APPLE-SA-2005-02-22",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html"
          },
          {
            "name": "13271",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13271"
          },
          {
            "name": "29035",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29035"
          },
          {
            "name": "61",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/61"
          },
          {
            "name": "12317",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12317"
          },
          {
            "name": "ADV-2008-0599",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0599"
          },
          {
            "name": "sdk-jre-applet-restriction-bypass(18188)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18188"
          },
          {
            "name": "101523",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101523-1"
          },
          {
            "name": "VU#760344",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/760344"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21257249"
          },
          {
            "name": "57591",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-11-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20041122 Sun Java Plugin Arbitrary Package Access Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=158\u0026type=vulnerabilities"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://jouko.iki.fi/adv/javaplugin.html"
        },
        {
          "name": "oval:org.mitre.oval:def:5674",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5674"
        },
        {
          "name": "APPLE-SA-2005-02-22",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html"
        },
        {
          "name": "13271",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13271"
        },
        {
          "name": "29035",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29035"
        },
        {
          "name": "61",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/61"
        },
        {
          "name": "12317",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12317"
        },
        {
          "name": "ADV-2008-0599",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0599"
        },
        {
          "name": "sdk-jre-applet-restriction-bypass(18188)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18188"
        },
        {
          "name": "101523",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101523-1"
        },
        {
          "name": "VU#760344",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/760344"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21257249"
        },
        {
          "name": "57591",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1029",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20041122 Sun Java Plugin Arbitrary Package Access Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=158\u0026type=vulnerabilities"
            },
            {
              "name": "http://jouko.iki.fi/adv/javaplugin.html",
              "refsource": "MISC",
              "url": "http://jouko.iki.fi/adv/javaplugin.html"
            },
            {
              "name": "oval:org.mitre.oval:def:5674",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5674"
            },
            {
              "name": "APPLE-SA-2005-02-22",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html"
            },
            {
              "name": "http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html",
              "refsource": "CONFIRM",
              "url": "http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html"
            },
            {
              "name": "13271",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13271"
            },
            {
              "name": "29035",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29035"
            },
            {
              "name": "61",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/61"
            },
            {
              "name": "12317",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12317"
            },
            {
              "name": "ADV-2008-0599",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0599"
            },
            {
              "name": "sdk-jre-applet-restriction-bypass(18188)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18188"
            },
            {
              "name": "101523",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101523-1"
            },
            {
              "name": "VU#760344",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/760344"
            },
            {
              "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21257249",
              "refsource": "CONFIRM",
              "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21257249"
            },
            {
              "name": "57591",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1029",
    "datePublished": "2004-11-24T05:00:00",
    "dateReserved": "2004-11-12T00:00:00",
    "dateUpdated": "2024-08-08T00:39:00.544Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-0817
Vulnerability from cvelistv5
Published
2005-03-20 05:00
Modified
2024-08-07 21:28
Severity ?
Summary
Unknown vulnerability in the DNSd proxy, as used in Symantec Gateway Security 5400 2.x and 5300 1.x, Enterprise Firewall 7.0.x and 8.x, and VelociRaptor 1100/1200/1300 1.5, allows remote attackers to poison the DNS cache and redirect users to malicious sites.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:28.821Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "sef-dns-spoofing(16423)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16423"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.isc.sans.org/diary.php?date=2005-03-04"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.15.html"
          },
          {
            "name": "symantec-dnsdproxy-redirect(44530)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44530"
          },
          {
            "name": "1013451",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1013451"
          },
          {
            "name": "20040615 Symantec Enterprise Firewall DNSD cache poisoning Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0225.html"
          },
          {
            "name": "14595",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14595"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unknown vulnerability in the DNSd proxy, as used in Symantec Gateway Security 5400 2.x and 5300 1.x, Enterprise Firewall 7.0.x and 8.x, and VelociRaptor 1100/1200/1300 1.5, allows remote attackers to poison the DNS cache and redirect users to malicious sites."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "sef-dns-spoofing(16423)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16423"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.isc.sans.org/diary.php?date=2005-03-04"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.15.html"
        },
        {
          "name": "symantec-dnsdproxy-redirect(44530)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44530"
        },
        {
          "name": "1013451",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1013451"
        },
        {
          "name": "20040615 Symantec Enterprise Firewall DNSD cache poisoning Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0225.html"
        },
        {
          "name": "14595",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14595"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0817",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unknown vulnerability in the DNSd proxy, as used in Symantec Gateway Security 5400 2.x and 5300 1.x, Enterprise Firewall 7.0.x and 8.x, and VelociRaptor 1100/1200/1300 1.5, allows remote attackers to poison the DNS cache and redirect users to malicious sites."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "sef-dns-spoofing(16423)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16423"
            },
            {
              "name": "http://www.isc.sans.org/diary.php?date=2005-03-04",
              "refsource": "MISC",
              "url": "http://www.isc.sans.org/diary.php?date=2005-03-04"
            },
            {
              "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.15.html",
              "refsource": "CONFIRM",
              "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.15.html"
            },
            {
              "name": "symantec-dnsdproxy-redirect(44530)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44530"
            },
            {
              "name": "1013451",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1013451"
            },
            {
              "name": "20040615 Symantec Enterprise Firewall DNSD cache poisoning Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0225.html"
            },
            {
              "name": "14595",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14595"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0817",
    "datePublished": "2005-03-20T05:00:00",
    "dateReserved": "2005-03-20T00:00:00",
    "dateUpdated": "2024-08-07T21:28:28.821Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2007-10-05 21:17
Modified
2024-11-21 00:33
Severity ?
Summary
The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header.
Impacted products
Vendor Product Version
symantec antivirus_scan_engine 4.0
symantec antivirus_scan_engine 4.0
symantec antivirus_scan_engine 4.1
symantec antivirus_scan_engine 4.1.8
symantec antivirus_scan_engine 4.3
symantec antivirus_scan_engine 4.3
symantec antivirus_scan_engine 4.3
symantec antivirus_scan_engine 4.3
symantec antivirus_scan_engine 4.3
symantec antivirus_scan_engine 4.3.3
symantec antivirus_scan_engine 4.3.7.27
symantec antivirus_scan_engine 4.3.8.29
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 5.0
symantec antivirus_scan_engine 5.0.1
symantec brightmail_antispam 4.0
symantec brightmail_antispam 5.5
symantec brightmail_antispam 6.0
symantec brightmail_antispam 6.0.1
symantec brightmail_antispam 6.0.2
symantec brightmail_antispam 6.0.3
symantec brightmail_antispam 6.0.4
symantec client_security 2.0
symantec client_security 2.0
symantec client_security 2.0
symantec client_security 2.0.1_build_9.0.1.1000
symantec client_security 2.0.2_build_9.0.2.1000
symantec client_security 2.0.3_build_9.0.3.1000
symantec client_security 2.0.4
symantec client_security 2.0.4
symantec client_security 2.0.5_build_1100_mp1
symantec client_security 2.0.6
symantec client_security 3.0
symantec client_security 3.0.0.359
symantec client_security 3.0.1.1000
symantec client_security 3.0.1.1001
symantec client_security 3.0.1.1007
symantec client_security 3.0.1.1008
symantec client_security 3.0.2.2000
symantec client_security 3.0.2.2001
symantec client_security 3.0.2.2002
symantec client_security 3.0.2.2010
symantec client_security 3.0.2.2011
symantec client_security 3.0.2.2020
symantec client_security 3.0.2.2021
symantec client_security 3.1
symantec client_security 3.1.394
symantec client_security 3.1.396
symantec client_security 3.1.400
symantec client_security 3.1.401
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0.1
symantec mail_security 4.1
symantec mail_security 4.1
symantec mail_security 4.1
symantec mail_security 4.5
symantec mail_security 4.5.4.743
symantec mail_security 4.5_build_719
symantec mail_security 4.5_build_736
symantec mail_security 4.5_build_741
symantec mail_security 4.6.1.107
symantec mail_security 4.6.3
symantec mail_security 4.6_build_97
symantec mail_security 5.0
symantec mail_security 5.0
symantec mail_security 5.0.0.204
symantec mail_security 5.0.1
symantec mail_security 5.1.0
symantec mail_security 6.0.0
symantec norton_antivirus *
symantec norton_antivirus 9.0
symantec norton_antivirus 9.0
symantec norton_antivirus 9.0.0
symantec norton_antivirus 9.0.0.338
symantec norton_antivirus 9.0.1
symantec norton_antivirus 9.0.1.1.1000
symantec norton_antivirus 9.0.2
symantec norton_antivirus 9.0.2.1000
symantec norton_antivirus 9.0.3
symantec norton_antivirus 9.0.3.1000
symantec norton_antivirus 9.0.4
symantec norton_antivirus 9.0.4
symantec norton_antivirus 9.0.5
symantec norton_antivirus 9.0.5.1100
symantec norton_antivirus 9.0.6.1000
symantec norton_antivirus 10.0
symantec norton_antivirus 10.0
symantec norton_antivirus 10.0.0
symantec norton_antivirus 10.0.0.359
symantec norton_antivirus 10.0.1
symantec norton_antivirus 10.0.1.1000
symantec norton_antivirus 10.0.1.1007
symantec norton_antivirus 10.0.1.1008
symantec norton_antivirus 10.0.2.2000
symantec norton_antivirus 10.0.2.2001
symantec norton_antivirus 10.0.2.2002
symantec norton_antivirus 10.0.2.2010
symantec norton_antivirus 10.0.2.2011
symantec norton_antivirus 10.0.2.2020
symantec norton_antivirus 10.0.2.2021
symantec norton_antivirus 10.1
symantec norton_antivirus 10.1.4
symantec norton_antivirus 10.1.4
symantec norton_antivirus 10.1.4.4010
symantec norton_antivirus 10.1.394
symantec norton_antivirus 10.1.396
symantec norton_antivirus 10.1.400
symantec norton_antivirus 10.1.401
symantec norton_antivirus 10.9.1
symantec norton_antivirus 2004
symantec norton_antivirus 2004
symantec norton_antivirus 2005
symantec norton_antivirus 2005
symantec norton_antivirus 2005
symantec norton_antivirus 2005
symantec norton_antivirus 2006
symantec norton_internet_security 3.0
symantec norton_internet_security 2004
symantec norton_internet_security 2004
symantec norton_internet_security 2005
symantec norton_internet_security 2005
symantec norton_internet_security 2005
symantec norton_internet_security 2005
symantec norton_internet_security 2005
symantec norton_internet_security 2006
symantec norton_internet_security 2006
symantec norton_personal_firewall 2006
symantec norton_personal_firewall 2006_9.1.0.33
symantec norton_personal_firewall 2006_9.1.1.7
symantec norton_system_works 3.0
symantec norton_system_works 2004
symantec norton_system_works 2005
symantec norton_system_works 2005
symantec norton_system_works 2005
symantec norton_system_works 2005
symantec norton_system_works 2006
symantec symantec_antivirus_filtering_\+for_domino 3.0.12
symantec web_security 2.5
symantec web_security 3.0
symantec web_security 3.0.1
symantec web_security 3.0.1.70
symantec web_security 3.0.1.76
symantec web_security 3.0.1_build_3.01.70
symantec web_security 3.0.1_build_3.01.72
symantec web_security 3.0.1_build_3.01.74
symantec web_security 3.01.59
symantec web_security 3.01.60
symantec web_security 3.01.61
symantec web_security 3.01.62
symantec web_security 3.01.63
symantec web_security 3.01.67
symantec web_security 3.01.68
symantec web_security 5.0
symantec gateway_security_5000_series 3.0.1
symantec gateway_security_5400 2.0.1
symantec mail_security_8820_appliance *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2AD14C-2BD2-4658-BDB0-232A9E26EA2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:clearswift:*:*:*:*:*",
              "matchCriteriaId": "1E739083-DFC2-4A89-9F84-E067E127D420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65DC45B-8FA9-453E-8249-45535EA64D34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9DA3717-A218-459B-891C-F3F945D42A22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11687CE-E997-4D26-ACAE-B9175348ADDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:caching:*:*:*:*:*",
              "matchCriteriaId": "2F90AD67-02CB-4006-B567-631FD633DB17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:clearswift:*:*:*:*:*",
              "matchCriteriaId": "BC0F87D0-E4B5-41FC-8050-386B9CE04249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:microsoft_sharepoint:*:*:*:*:*",
              "matchCriteriaId": "FBBFF303-3DD6-4312-94CD-37E5170A93AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:network_attached_storage:*:*:*:*:*",
              "matchCriteriaId": "59962A9A-10F4-4F1B-A5AB-8743C0874963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "346F8C27-F389-412C-B7C2-2CF3344E557C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.7.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "51170553-03E8-4588-97A0-8DA57C37B5E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.8.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "A32C5A4C-9E39-4718-8BF1-283183B4A516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "301B1340-A402-4D3E-AAF8-17CD8B59517D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:caching:*:*:*:*:*",
              "matchCriteriaId": "52CE5595-323D-45A2-BD05-C6B2CBD6BA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:clearswift:*:*:*:*:*",
              "matchCriteriaId": "3042D5B7-AE27-4664-87DB-679422029199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:messaging:*:*:*:*:*",
              "matchCriteriaId": "671CBE65-1FCF-43B8-8D21-5C8CC7C17417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:microsoft_sharepoint:*:*:*:*:*",
              "matchCriteriaId": "28BD859A-F57B-444C-8083-AE99E59B9DC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:network_attached_storage:*:*:*:*:*",
              "matchCriteriaId": "6158E16F-468A-4B76-8199-500FCAC1E54D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "992DB720-52A8-43D4-B74B-96C0F763ED0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "685F58DC-6BD3-499C-A9D5-BB9C909FE857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "95436CD6-8E9C-4F89-9683-0650F6167027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC910CFD-9F20-473E-BC2D-64A7A3C14404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "849782E0-9F26-411F-82B9-88B5FC4F4C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAD87DB3-45C2-4091-A83B-25E427563C70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0910781-9EF9-4188-AA33-1C54F01A0832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7647813B-2B9F-4B0F-96D1-C533A49DDC6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "09AD23D0-4502-4090-9172-002B92D83C09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:scf_7.1:*:*:*:*:*",
              "matchCriteriaId": "97AF14CF-3BD6-4A03-B543-3150C656198E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0:build_9.0.0.338:stm:*:*:*:*:*",
              "matchCriteriaId": "8A1E2653-A061-48BD-AC62-643CDD78E859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.1_build_9.0.1.1000:mr1:*:*:*:*:*:*",
              "matchCriteriaId": "D934F853-C7E0-421E-9AF3-B7B49228722F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.2_build_9.0.2.1000:mr2:*:*:*:*:*:*",
              "matchCriteriaId": "D608AACF-A4BC-49CE-BE49-E8F3AEF31DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.3_build_9.0.3.1000:mr3:*:*:*:*:*:*",
              "matchCriteriaId": "3238894A-3C25-4CC8-A319-8AA7246FEC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D86F7A-F2C0-471C-8EA8-E1C7230F25AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:mr4_build1000:*:*:*:*:*:*",
              "matchCriteriaId": "11C1491F-01A1-47B1-87BB-6F7676448A2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.5_build_1100_mp1:mr5:*:*:*:*:*:*",
              "matchCriteriaId": "9204DC08-0809-4762-B5CB-5485E67CA31D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.6:mr6:*:*:*:*:*:*",
              "matchCriteriaId": "841CF36F-14A0-49A6-8442-681F25DC8DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB1C90D-DBC0-4DA0-AF5D-E42C41E84B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "2852548A-39A6-44FB-A73E-96507BA0CD8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB9641FC-FF7B-4413-8163-B795AA35C888",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*",
              "matchCriteriaId": "17862D7F-7001-46B8-A415-2A15A247E9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*",
              "matchCriteriaId": "170AEE7B-31AF-44E2-9B63-9703D0DE721C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*",
              "matchCriteriaId": "63B1A9FC-707C-4F6F-959B-30B28E43D202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E4E013-A819-42E0-8F8E-9B2D409F900E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*",
              "matchCriteriaId": "097B87A8-8176-4426-BDE4-6FDDD272E1B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EBD7767-C352-435B-8963-83F723FFD302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2FC1708-B643-4489-A59C-EBDAFD9B0078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCE0C8A-A97C-4DE1-B0EE-3A2D16A34C77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE714705-CEE9-4BA1-8573-FD3765BC7F94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6090F86-0B42-403F-9996-9B7670EBAA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.396:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3706E76-FC65-467E-8D09-A9EAC32E9BBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF555313-BB5A-4D8A-A3A1-609ABC39F6FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC74372F-329A-4597-810B-88B865771C9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:*:domino:*:*:*:*:*",
              "matchCriteriaId": "DA6CFDFD-1EB4-458A-AD39-320E619593D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "05B85F14-4248-4550-BE7F-D9BAB9DC90C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build456:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "419D2E24-CA90-471D-9F35-1795F6A65B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build463:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "965DA3C4-7559-4583-A5DC-BEABEAA7E87B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build465:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "EBEB8E8E-DB27-45FB-90CA-2CF3A515AC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build736:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "8184E073-37B0-4654-8DF8-379EFC5FB0D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build741:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "C29B7C1F-C4AB-4CAB-8177-B64F4B8A2B26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build743:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "D1FBFE00-4692-48C2-A6C7-9179E185A275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0.1:*:domino:*:*:*:*:*",
              "matchCriteriaId": "DBE74BFA-003E-40CC-83E1-1AC7159B0C1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build458:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "E21CDCBA-3C86-462B-8383-58C893978EBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build459:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "E6179A68-2322-4D79-9446-5A5E4B27AD33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build461:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "EE92421B-C0CA-4B28-9E26-EF0A115C9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.5:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "DC8AD646-E257-4065-B358-8B4944D327E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.5.4.743:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "F50BA510-67D5-4FF1-87D0-215B68D20EA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_719:*:exchange:*:*:*:*:*",
              "matchCriteriaId": "5CA62889-7A55-459F-BFD8-D38CD93F9219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_736:*:exchange:*:*:*:*:*",
              "matchCriteriaId": "766327B9-E8DA-4422-80C2-48E333161D0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_741:*:exchange:*:*:*:*:*",
              "matchCriteriaId": "3C5FF883-831F-47CC-BD04-BBFD25BDE8DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.6.1.107:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "C6EAA83D-2073-4360-BD3C-59AF34EADE1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.6.3:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "60D239DF-65AD-4492-AEE1-FCD36E99DD63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.6_build_97:*:exchange:*:*:*:*:*",
              "matchCriteriaId": "7AD92ABA-2D03-46FD-85D5-33FC369015DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "9608BF57-0D9A-4874-BFDA-C92447FACD70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:smtp:*:*:*:*:*",
              "matchCriteriaId": "96E660E2-C0F9-499F-A01D-DB368179F28F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0.204:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "8E1C4824-3774-41EF-80E1-42A417830978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*",
              "matchCriteriaId": "A8430D5E-A8A7-4724-8A6B-B5E2CA437729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:5.1.0:*:domino:*:*:*:*:*",
              "matchCriteriaId": "A3D2C4B6-2F13-4487-989E-AC247D4D011A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:6.0.0:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "091D4557-21F6-412F-933A-9F0FD8152E28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:*:*:corporate_edition_for_linux:*:*:*:*:*",
              "matchCriteriaId": "2CC0DE59-149C-42DD-9516-BDB79A9BC412",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "88FE6753-A619-4703-8120-F23EEC8C48EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "497635AC-D7F2-4A5C-8C37-DA493C9681A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "E72D8D65-340C-4505-AA80-F9E7870513EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "774AD674-895A-4242-9AC9-BAD6CB862785",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "242D33E8-1B6B-4562-9F2A-1B34E3B7BC71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "C9797D21-CD64-4B61-A4C1-AC4AD3F9B3D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "252ACD1B-323F-4139-880D-89D600F29986",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "618F6F78-566A-4901-8B57-BB6DCAC7E892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "B2D0922A-3EA3-4BC9-9311-9DCA57338CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "EB7F329F-4390-4735-B2C2-BC6A72FBE36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "A5D058F6-779B-4ED4-ADC7-A68491F72BAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:mr4_build_1000:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "29E1AF72-6D48-4DAF-904A-B55366189251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "4B5EE3B2-FF16-4231-B99D-81CB10239576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "7D26AB91-36AB-4BF6-9D0D-098F04C60AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.6.1000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "E5E0AB4E-4DD0-4D87-BBE5-B459A8B7301F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "4433613D-EB44-4D60-861F-F9FFA2ED4F6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "7225A578-8F62-42BD-99AC-D3385478613A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "FF0903BD-3E78-4024-A773-16100F519B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.0.359:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "BF18D806-E781-4F17-9341-D48CBC06949E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "1B390577-F1F1-4821-90FB-967E749F7CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "88AA69B4-865C-4959-9681-62A7591D6CFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1007:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "55EDC888-F593-49E8-95A4-87D8FE9CC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1008:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "B7A47F4F-DC34-4B7D-9C3A-4631FFFC1142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "B70ACBE6-C754-4A6F-AC2F-89657DA179E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2001:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "8C6C2421-5651-4B3F-9DBC-DC411C989BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2002:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "5B967B9A-215D-470A-9722-5782D0AE0980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "F4BFDD98-F70E-41A9-9245-7EC5D140D4F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2011:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "DFC9BF64-65E7-4E0E-A637-13794A02CEED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "6B188333-A087-4FC7-864B-F802932455F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "A33A8A08-F356-4616-A603-00ADCC062D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "B5889206-CE1C-489B-8984-EE4055BBC6BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "62EA1AE0-6A8B-4C13-B95D-7F9694AD5535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4:mr4_mp1_build4010:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "B31249CA-296D-42C2-8939-61B990559BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4.4010:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "5C6B6D3A-715A-45B9-8231-77A6DE847973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.394:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "73A3CB7B-DD39-48E7-8D33-1E222933A7D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.396:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "116F0C9D-9255-4B98-B1CF-C78A96240784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.400:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "A8957B43-0673-439F-86F6-5791372BA498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.401:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "D2ACD718-6232-463A-ACEE-B06A02D3243A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.9.1:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "44073E2A-A8AB-4D1A-BCFC-8439E40E97E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5E129A-4FA8-4084-92BE-5A65FABD53DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:professional:*:*:*:*:*",
              "matchCriteriaId": "C2E302A4-72F8-478B-9FA2-2536902986B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*",
              "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:professional:*:*:*:*:*",
              "matchCriteriaId": "3967227C-FCB1-486E-A6C4-43B8004C4A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:11.0:*:*:*:*:*:*",
              "matchCriteriaId": "894F1929-1029-4B57-A66A-EA58F7D94D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:11.0.9:*:*:*:*:*:*",
              "matchCriteriaId": "C532E93A-5D0D-454D-8B14-F5E9C6A0499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:3.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "D2259605-B720-42B0-8476-6CAE07C7B143",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*",
              "matchCriteriaId": "09CA1AC8-E273-44C1-9D1C-19542EB57433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:professional:*:*:*:*:*",
              "matchCriteriaId": "E4BBE123-56E1-46E0-93BE-38F0932D9C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.0:*:*:*:*:*:*",
              "matchCriteriaId": "F39AE3D7-7018-47AB-B332-D40EA5273CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.0.9:*:*:*:*:*:*",
              "matchCriteriaId": "82446BA3-92F9-4689-9D67-3CE159AA0F49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.5.6.14:*:*:*:*:*:*",
              "matchCriteriaId": "98F9F2E3-1775-4EF9-9FE0-0D011307C269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:professional:*:*:*:*:*",
              "matchCriteriaId": "1DE91FB9-35C3-4DC7-BE00-7C60EE9FD880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E8C73F1-FEF1-40A3-BFAB-CE226B98E001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FC50007-59F4-45B0-BABF-BCF2CAB4A9B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:3.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "F648A08A-24EF-45A5-B7FD-00CAD5892061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "F589D9AA-FD1B-4929-93DC-801C36087E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*",
              "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:premier:*:*:*:*:*",
              "matchCriteriaId": "CBB1521D-B16D-4E28-8723-AF96E95D7596",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:11.0:*:*:*:*:*:*",
              "matchCriteriaId": "67EECA52-EECB-4AAA-85F9-ADBE028B8068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:11.0.9:*:*:*:*:*:*",
              "matchCriteriaId": "CE8022C6-360B-4A3D-AD70-3DC79B339231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:symantec_antivirus_filtering_\\+for_domino:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "37AE8BC0-663C-4D1D-8FF5-13F682BBEE79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B08F85-A0E6-4984-83E9-41CD29751BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "690F3A5F-F990-41C9-9964-B033188C86F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E4FAC8-2893-48FA-B159-49C8AA380338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D37768F-A43C-420E-85CA-A5EF3E30F47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABE3F492-D08F-4558-BC19-F33BBB0D55A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4CD5C31-4F4A-44F1-A3E1-2B4BB78E152D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "F39BAADB-6BF1-4871-ABEC-4BFA1321FE59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "451A414E-1A02-45D1-8DFC-61B3E17BF12A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "B05B8522-E203-49A0-8C5B-3DA7B06AF5AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD064CE-3C39-4243-B59E-CC8E48ED50DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "9886B467-793C-4D07-9B1B-B80FA5266D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "676F5A96-B21B-49FF-86EA-F18F9C3931C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "18991132-C5B6-43AB-BDCB-196BB2957F27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "42CE2596-83A9-4A80-A8C6-825EDEAAB8B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA16BAF-6263-44EA-B3EB-187264913D8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:5.0:*:microsoft_isa_2004:*:*:*:*:*",
              "matchCriteriaId": "8E7C32F4-1225-4A4E-BD98-DFE026383482",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5000_series:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76147168-37FB-444C-BD40-EFC31A0A499A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5400:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA896DF0-76AD-4CEE-9FE0-5E6758FC9A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:mail_security_8820_appliance:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "823BD557-6352-4EC2-AE78-2C0CE6F660D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header."
    },
    {
      "lang": "es",
      "value": "El componente Decomposer en m\u00faltiples productos Symantec permite a atacantes remotos provocar denegaci\u00f3n de servicio (bucles infinitos) a trav\u00e9s de ciertos valores en el campo PACK_SIZE de una cabecera de archivo RAR."
    }
  ],
  "id": "CVE-2007-3699",
  "lastModified": "2024-11-21T00:33:51.380",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-10-05T21:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/36119"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26053"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24282"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2508"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/36119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24282"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2508"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-03-15 05:00
Modified
2024-11-20 23:47
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Management Service for Symantec Gateway Security 2.0 allows remote attackers to steal cookies and hijack a management session via a /sgmi URL that contains malicious script, which is not quoted in the resulting error page.
Impacted products
Vendor Product Version
symantec gateway_security_5400 2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5400:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1B7CF42-F93E-48E6-BCD2-30B357F80DDA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Management Service for Symantec Gateway Security 2.0 allows remote attackers to steal cookies and hijack a management session via a /sgmi URL that contains malicious script, which is not quoted in the resulting error page."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el Servicio de Administraci\u00f3n de Symantec Gateway Security 2.0 permite a atacantes remotos robar cookies y secuestrar una sesi\u00f3n de administraci\u00f3n mediante una URL /smgi que contiene un script malicioso, que no es puesto entre comillas en la p\u00e1gina de error resultante."
    }
  ],
  "id": "CVE-2004-0192",
  "lastModified": "2024-11-20T23:47:58.373",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-03-15T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=107790684732458\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9755"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15330"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=107790684732458\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9755"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15330"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:48
Severity ?
Summary
Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:entrust:entrust_libkmp_isakmp_library:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "302E62EC-C81E-4BD5-A8E0-0CC55F34BE17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "8656778B-9299-436B-AF8A-64C042273751",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0.4:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "78A16B88-E49B-4C4C-A82E-03511C99872D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0.4:*:windows_2000_nt:*:*:*:*:*",
              "matchCriteriaId": "30BE919C-A7DF-46C3-BFF6-F0452F0FC434",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:8.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "F66D6BB6-2355-4644-8A18-725F9E970EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:8.0:*:windows_2000_nt:*:*:*:*:*",
              "matchCriteriaId": "AD892E2E-E1C9-49A2-A42C-3B56F2B0BA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:velociraptor:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C260200D-60D2-41E2-8F5C-50796EBBF8E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5300:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EDDB133-A6C8-45B4-9988-3D3D2F3952E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5400:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1B7CF42-F93E-48E6-BCD2-30B357F80DDA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Entrust LibKmp ISAKMP library, as used by Symantec Enterprise Firewall 7.0 through 8.0, Gateway Security 5300 1.0, Gateway Security 5400 2.0, and VelociRaptor 1.5, allows remote attackers to execute arbitrary code via a crafted ISAKMP payload."
    }
  ],
  "id": "CVE-2004-0369",
  "lastModified": "2024-11-20T23:48:26.050",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.auscert.org.au/render.html?it=4339"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ciac.org/ciac/bulletins/o-206.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/11039"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://xforce.iss.net/xforce/alerts/id/181"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15669"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.08.26.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.auscert.org.au/render.html?it=4339"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ciac.org/ciac/bulletins/o-206.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/11039"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://xforce.iss.net/xforce/alerts/id/181"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15669"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-03-01 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages.
References
cve@mitre.orghttp://jouko.iki.fi/adv/javaplugin.html
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html
cve@mitre.orghttp://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html
cve@mitre.orghttp://secunia.com/advisories/13271Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29035Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/61
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101523-1Patch, Vendor Advisory
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1Patch, Vendor Advisory
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=swg21257249
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=158&type=vulnerabilities
cve@mitre.orghttp://www.kb.cert.org/vuls/id/760344US Government Resource
cve@mitre.orghttp://www.securityfocus.com/bid/12317Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0599Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18188
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5674
af854a3a-2127-422b-91ae-364da2661108http://jouko.iki.fi/adv/javaplugin.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13271Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29035Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/61
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101523-1Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=swg21257249
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=158&type=vulnerabilities
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/760344US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12317Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0599Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18188
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5674
Impacted products
Vendor Product Version
hp java_sdk-rte 1.3
hp java_sdk-rte 1.4
sun jdk 1.3.1_01
sun jdk 1.3.1_01
sun jdk 1.3.1_01a
sun jdk 1.3.1_02
sun jdk 1.3.1_02
sun jdk 1.3.1_02
sun jdk 1.3.1_03
sun jdk 1.3.1_03
sun jdk 1.3.1_03
sun jdk 1.3.1_04
sun jdk 1.3.1_05
sun jdk 1.3.1_05
sun jdk 1.3.1_05
sun jdk 1.3.1_06
sun jdk 1.3.1_06
sun jdk 1.3.1_06
sun jdk 1.3.1_07
sun jdk 1.3.1_07
sun jdk 1.3.1_07
sun jdk 1.4
sun jdk 1.4
sun jdk 1.4
sun jdk 1.4.0_01
sun jdk 1.4.0_02
sun jdk 1.4.0_02
sun jdk 1.4.0_02
sun jdk 1.4.0_03
sun jdk 1.4.0_03
sun jdk 1.4.0_03
sun jdk 1.4.0_4
sun jdk 1.4.0_4
sun jdk 1.4.0_4
sun jdk 1.4.1
sun jdk 1.4.1
sun jdk 1.4.1
sun jdk 1.4.1_01
sun jdk 1.4.1_01
sun jdk 1.4.1_01
sun jdk 1.4.1_02
sun jdk 1.4.1_02
sun jdk 1.4.1_02
sun jdk 1.4.1_03
sun jdk 1.4.1_03
sun jdk 1.4.1_03
sun jdk 1.4.2
sun jdk 1.4.2
sun jdk 1.4.2
sun jdk 1.4.2_01
sun jdk 1.4.2_02
sun jdk 1.4.2_03
sun jdk 1.4.2_03
sun jdk 1.4.2_03
sun jdk 1.4.2_04
sun jdk 1.4.2_04
sun jdk 1.4.2_04
sun jdk 1.4.2_05
sun jdk 1.4.2_05
sun jdk 1.4.2_05
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.0
sun jre 1.3.1
sun jre 1.3.1
sun jre 1.3.1
sun jre 1.3.1
sun jre 1.3.1
sun jre 1.3.1
sun jre 1.3.1
sun jre 1.3.1
sun jre 1.3.1
sun jre 1.3.1
sun jre 1.3.1_02
sun jre 1.3.1_02
sun jre 1.3.1_02
sun jre 1.3.1_03
sun jre 1.3.1_03
sun jre 1.3.1_03
sun jre 1.3.1_05
sun jre 1.3.1_05
sun jre 1.3.1_05
sun jre 1.3.1_06
sun jre 1.3.1_06
sun jre 1.3.1_06
sun jre 1.3.1_07
sun jre 1.3.1_07
sun jre 1.3.1_07
sun jre 1.3.1_09
sun jre 1.3.1_09
sun jre 1.3.1_09
sun jre 1.4
sun jre 1.4
sun jre 1.4
sun jre 1.4.0_01
sun jre 1.4.0_01
sun jre 1.4.0_02
sun jre 1.4.0_02
sun jre 1.4.0_02
sun jre 1.4.0_03
sun jre 1.4.0_03
sun jre 1.4.0_03
sun jre 1.4.0_04
sun jre 1.4.0_04
sun jre 1.4.0_04
sun jre 1.4.1
sun jre 1.4.1
sun jre 1.4.1
sun jre 1.4.1
sun jre 1.4.1
sun jre 1.4.1
sun jre 1.4.1_01
sun jre 1.4.1_01
sun jre 1.4.1_01
sun jre 1.4.1_02
sun jre 1.4.1_02
sun jre 1.4.1_02
sun jre 1.4.1_07
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
sun jre 1.4.2
symantec enterprise_firewall 8.0
symantec enterprise_firewall 8.0
symantec enterprise_firewall 8.0
conectiva linux 10.0
gentoo linux *
hp hp-ux 11.00
hp hp-ux 11.11
hp hp-ux 11.22
hp hp-ux 11.23
symantec gateway_security_5400 2.0
symantec gateway_security_5400 2.0.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:java_sdk-rte:1.3:*:hp-ux_pa-risc:*:*:*:*:*",
              "matchCriteriaId": "071B3C37-AD2C-4FA5-84C1-790264D51F5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:java_sdk-rte:1.4:*:hp-ux_pa-risc:*:*:*:*:*",
              "matchCriteriaId": "EEFEFB2F-D9CD-4609-B92A-A24F6143DF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*",
              "matchCriteriaId": "7914F3C3-70D2-4528-8781-74F8EE2A672F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "C25FD66C-2B23-4A08-95A9-C026B6C7B334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*",
              "matchCriteriaId": "4EE03D61-ED9C-4E5A-8B8A-B9DE6D953A59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_02:*:linux:*:*:*:*:*",
              "matchCriteriaId": "D60D0903-A74A-4366-9EEE-FE44324A5525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_02:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "BA9D3750-C44E-4416-8EF8-EBB3815871DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_02:*:windows:*:*:*:*:*",
              "matchCriteriaId": "FE5001BA-BF6B-431E-B5E6-A0484B31DCA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*",
              "matchCriteriaId": "91C7D131-506C-4AEC-A736-0E4D4C6DFED7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "38B09D0A-D9E1-440C-9111-5E04D983F687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*",
              "matchCriteriaId": "7C3BD547-71C6-4A69-9F98-AD082595B6C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_04:*:windows:*:*:*:*:*",
              "matchCriteriaId": "66EE3DB6-55B2-44D6-AE20-D6F68294E2DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:linux:*:*:*:*:*",
              "matchCriteriaId": "4229767D-F6B2-47A2-A1EA-CA86A10ECF17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "AA641432-0B20-4F91-A9C1-804BBE1E05D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_05:*:windows:*:*:*:*:*",
              "matchCriteriaId": "2A23F13E-57BD-4D8D-A767-5D8BA4F24A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_06:*:linux:*:*:*:*:*",
              "matchCriteriaId": "88E78DC4-9952-431F-BA3D-32D942D12DCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_06:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "3E46AAC2-F345-49E1-B20F-409B53DCAF0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_06:*:windows:*:*:*:*:*",
              "matchCriteriaId": "3C3D0367-54C0-4036-A5C6-CEF3ECE01F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_07:*:linux:*:*:*:*:*",
              "matchCriteriaId": "4F5D90B0-4068-4050-935A-1CBC822521D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_07:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "148EE76E-0382-42CD-89DD-C041BAB35B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.3.1_07:*:windows:*:*:*:*:*",
              "matchCriteriaId": "9B47BF85-160E-4E5E-9821-9D6BFC1939C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*",
              "matchCriteriaId": "32CA2101-45D2-41D8-A11A-506683EDC0DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "2E449C78-3BFD-4F52-9EE2-3BC5FC27FBCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*",
              "matchCriteriaId": "3C4BAD5A-329C-4C6F-B517-E7C95EEAEB99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.0_01:*:windows:*:*:*:*:*",
              "matchCriteriaId": "64762803-D970-467D-A3B7-1879BC68E805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.0_02:*:linux:*:*:*:*:*",
              "matchCriteriaId": "AD97824E-C229-4530-A4E6-C4281E2580C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.0_02:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "B90BBCB8-7DF5-4801-8B43-197C2FB88823",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.0_02:*:windows:*:*:*:*:*",
              "matchCriteriaId": "666FE53E-C775-4D7D-98E0-C8638B2F2FAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.0_03:*:linux:*:*:*:*:*",
              "matchCriteriaId": "99A889BD-01D8-491E-882A-C65EEF6A952B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.0_03:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "7713E276-D273-4AAB-B6BF-16279354A054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.0_03:*:windows:*:*:*:*:*",
              "matchCriteriaId": "FCE8ADC0-49E9-4F56-9435-F823A1512F44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.0_4:*:linux:*:*:*:*:*",
              "matchCriteriaId": "8FAC216A-01DF-43CF-9430-4E979C950C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.0_4:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "F9D9F115-8E12-4658-95A6-FF70833DCAF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.0_4:*:windows:*:*:*:*:*",
              "matchCriteriaId": "088448A2-83E7-4023-9575-520612B99634",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "C92F64D1-9916-44AC-8025-F116B70CD76A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "DF21C410-30BF-423D-979F-7B5682573E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1:*:windows:*:*:*:*:*",
              "matchCriteriaId": "BA9FCF82-886A-4C70-8107-FB5BE705DD45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1_01:*:linux:*:*:*:*:*",
              "matchCriteriaId": "50542C59-E3F7-476F-8938-0316BB3CE46F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1_01:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "28C890E0-7230-4831-BDD4-B054662FD0C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1_01:*:windows:*:*:*:*:*",
              "matchCriteriaId": "89CF51EF-D1CC-44A7-80D7-954FE9866799",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1_02:*:linux:*:*:*:*:*",
              "matchCriteriaId": "7BD5DADC-20C9-46CE-B190-589DA9813A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1_02:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "E1C99007-713C-4AC4-A819-4C677B876D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1_02:*:windows:*:*:*:*:*",
              "matchCriteriaId": "ADD9EE28-7D16-4CD6-9F33-ECC7073F7FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1_03:*:linux:*:*:*:*:*",
              "matchCriteriaId": "342972F6-E888-43E6-B3B5-3B70AC6DB58F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1_03:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "20F9F987-00B1-49D4-970A-98E0CAE05516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.1_03:*:windows:*:*:*:*:*",
              "matchCriteriaId": "726D5907-547A-492E-9C66-BBA08B12506C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2:*:linux:*:*:*:*:*",
              "matchCriteriaId": "37F8AA83-3B27-4EB5-BC5E-E541248F61F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "A315C2C4-A6ED-4E09-8B36-9903C35438CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2:*:windows:*:*:*:*:*",
              "matchCriteriaId": "CFEA5E04-78E2-47E6-90B8-536845343084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_01:*:linux:*:*:*:*:*",
              "matchCriteriaId": "BF931660-BB60-4460-91E4-C4E63E46996D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_02:*:linux:*:*:*:*:*",
              "matchCriteriaId": "3AF426F2-93EF-4F2C-AD0C-8AB40AD72364",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_03:*:linux:*:*:*:*:*",
              "matchCriteriaId": "0998DD04-3BC7-4B64-89F5-C6FFECC2F9EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_03:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "B6A5803A-4AFF-4120-BF43-55DCE1B11172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_03:*:windows:*:*:*:*:*",
              "matchCriteriaId": "6819CEAB-536F-4E4D-8E69-934BD959759C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_04:*:linux:*:*:*:*:*",
              "matchCriteriaId": "70DEC641-5BC0-45CF-BE6B-3B05E34A2DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_04:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "55AD8FB0-7C9B-4631-B55F-5F0B8AC28431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_04:*:windows:*:*:*:*:*",
              "matchCriteriaId": "B048B00C-C447-4CD9-80E1-FAEEE0390F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_05:*:linux:*:*:*:*:*",
              "matchCriteriaId": "3F17436E-94D7-40C2-AA1C-947973E8B824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_05:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "3B8B6F66-9D6E-4F64-B4E9-32B46E0B3190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jdk:1.4.2_05:*:windows:*:*:*:*:*",
              "matchCriteriaId": "6C77B29A-160F-44D6-B8E0-AFF4D9F4295F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:*:linux:*:*:*:*:*",
              "matchCriteriaId": "C80967B2-546E-4C20-8B0D-2B9BA0D5FE0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "36C3E5A4-7B4E-4DA3-A3B2-33ED7FDB7B0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*",
              "matchCriteriaId": "58EC15B8-4653-490D-8F3A-5AA5CDBA1DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:update1:linux:*:*:*:*:*",
              "matchCriteriaId": "51BB57BF-7996-45FE-A406-309ADEC4A052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*",
              "matchCriteriaId": "6B3248A9-A42D-47D7-9EF6-A68BB3F55096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*",
              "matchCriteriaId": "5F54BFB9-ACE4-4C70-9D5E-C964A37B49D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*",
              "matchCriteriaId": "F2255FF1-CD7F-416E-82CE-727A0D9B9B00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:update3:linux:*:*:*:*:*",
              "matchCriteriaId": "701A80AC-E5BF-42FB-916B-5871E051AD51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:update4:linux:*:*:*:*:*",
              "matchCriteriaId": "6FB2E24F-7599-4438-BBF5-803A8F6F1CC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:update4:windows:*:*:*:*:*",
              "matchCriteriaId": "6136361A-10B4-4DF0-A5E1-1A0E68008BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*",
              "matchCriteriaId": "6ED3AE5C-F50B-4ABE-AD92-D6F91E6F1D6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*",
              "matchCriteriaId": "DD448EDD-02A6-4902-8003-2C24490CDDEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*",
              "matchCriteriaId": "6668C814-CF6F-4684-B84E-F0E24C318677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "AB5A6F28-5B2E-4020-AC22-5FF1AB5DC0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*",
              "matchCriteriaId": "2458734D-2871-4104-B791-F12218A65CA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*",
              "matchCriteriaId": "CEB5308E-DFBE-4038-A618-F5448E7B590D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:windows:*:*:*:*:*",
              "matchCriteriaId": "BF2F0F47-CB18-41EC-9500-9BCCBBF0055F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1a:windows:*:*:*:*:*",
              "matchCriteriaId": "CD25BB5F-16E0-48D8-BD6B-9AAA95EF84F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1:update4:solaris:*:*:*:*:*",
              "matchCriteriaId": "C16614FE-919F-4141-A6F0-8E8F5D79FFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1:update4:windows:*:*:*:*:*",
              "matchCriteriaId": "6E75D769-12E0-47BD-AE43-4149F98371C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1:update8:linux:*:*:*:*:*",
              "matchCriteriaId": "F1FD82E4-80AF-46B4-8C8C-96112623BD43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1:update8:solaris:*:*:*:*:*",
              "matchCriteriaId": "B822A5B3-E32E-4113-90D8-039399B91842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1:update8:windows:*:*:*:*:*",
              "matchCriteriaId": "921F085D-EBDB-42D3-A6D8-C64C26CA1432",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_02:*:linux:*:*:*:*:*",
              "matchCriteriaId": "68CF8E07-EA3A-4116-B8DE-AF172DA12C02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_02:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "96332693-1CA0-437D-9D38-3253477FF09D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_02:*:windows:*:*:*:*:*",
              "matchCriteriaId": "1253CBD8-6CBB-457F-BC39-93509A9D3207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*",
              "matchCriteriaId": "C1C8FAED-AD0F-4B28-A5EF-DBD6514D60CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "16C38B5F-673D-47F2-87C6-59B2CBF917BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*",
              "matchCriteriaId": "78916851-B219-4E06-A35F-EAF3680A8F75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:linux:*:*:*:*:*",
              "matchCriteriaId": "76CB2CF8-242B-4C09-9B1A-12C39E35AB18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "7B1A497B-BF46-4B5B-B4C4-1382319F2ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_05:*:windows:*:*:*:*:*",
              "matchCriteriaId": "2E95B9F6-ADF2-47A5-A0AC-2A129A7A40CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:linux:*:*:*:*:*",
              "matchCriteriaId": "193FE315-35A5-403A-BE00-3C33A6A36FCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "51D7939D-6ABB-4300-9756-E744625BA8DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_06:*:windows:*:*:*:*:*",
              "matchCriteriaId": "24AA6F4C-2B79-4575-AD80-90366A6506AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:linux:*:*:*:*:*",
              "matchCriteriaId": "58A5F1ED-0851-4EAE-8F28-A0362B338625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "58FEC521-16ED-4FE0-9191-1E0046F8CB46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_07:*:windows:*:*:*:*:*",
              "matchCriteriaId": "73D0A70E-EA0B-42E5-BAC0-A400887B2F24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:linux:*:*:*:*:*",
              "matchCriteriaId": "B6F96CC5-5801-44AF-961F-29930643A98E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "466EB563-C756-4F04-9B25-5852DFA747A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.3.1_09:*:windows:*:*:*:*:*",
              "matchCriteriaId": "CF9D2AE0-DE2B-4FD1-ABA1-783515B2C4EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*",
              "matchCriteriaId": "16EB847E-C18B-4B07-940D-C0E312D11365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "68727223-1523-467A-8AAA-ED3E4C6C4B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*",
              "matchCriteriaId": "682E551B-7B86-4161-84D5-6E1D9664A2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_01:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "282FD7B0-6D3B-45A1-B717-15FB7A8128EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_01:*:windows:*:*:*:*:*",
              "matchCriteriaId": "09F85CA0-99C0-489D-BFF7-45D97C9DFC09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_02:*:linux:*:*:*:*:*",
              "matchCriteriaId": "9E919686-B384-4C33-8264-18B5140BB526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_02:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "A6980636-7B47-4AAF-B261-13E0704FABF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_02:*:windows:*:*:*:*:*",
              "matchCriteriaId": "E14CBB9A-E9A4-4BAF-ADA9-DDCEEC93A0DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_03:*:linux:*:*:*:*:*",
              "matchCriteriaId": "4B652361-1C41-4C95-B92D-658BF7EA3C71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_03:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "54B0B095-269E-4566-BC50-60AAE568F2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_03:*:windows:*:*:*:*:*",
              "matchCriteriaId": "E25DC9C3-60E9-4DBE-BE90-D0B04B63791A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_04:*:linux:*:*:*:*:*",
              "matchCriteriaId": "99D8A546-E5A7-4958-846B-3822A64F1EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_04:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "888AE9B5-A998-4B59-99A3-F580A204D094",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.0_04:*:windows:*:*:*:*:*",
              "matchCriteriaId": "BAC8313C-8808-407D-A8F5-38995260039D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1:*:linux:*:*:*:*:*",
              "matchCriteriaId": "B2F5A718-AB93-4C7F-80A8-9A90ECE2AC77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "C78AAFC5-05A6-47A2-A3B2-1B032C9169F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1:*:windows:*:*:*:*:*",
              "matchCriteriaId": "8373EE84-FCAE-4CF7-BE9D-9588D05CA827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1:update3:linux:*:*:*:*:*",
              "matchCriteriaId": "15EEE9A7-2472-47EF-B27B-5EBB8019853C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1:update3:solaris:*:*:*:*:*",
              "matchCriteriaId": "0E7A4D91-8AC7-4092-910D-7DB2A962CA7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1:update3:windows:*:*:*:*:*",
              "matchCriteriaId": "1CEBCC8A-4E92-4C7D-A237-11B582B7D01E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1_01:*:linux:*:*:*:*:*",
              "matchCriteriaId": "66004554-1B7E-4C6B-9BD8-344417DC6E37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1_01:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "1ADA6092-791D-4E94-954D-E3A7C944C1C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1_01:*:windows:*:*:*:*:*",
              "matchCriteriaId": "5A53C9BC-941F-4C33-853B-0847FED5555D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1_02:*:linux:*:*:*:*:*",
              "matchCriteriaId": "81F98FE5-EC95-42AF-B8A0-D1DB6E7F2039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1_02:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "C888E7A0-9B40-4844-AE51-1A171E4C6A03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1_02:*:windows:*:*:*:*:*",
              "matchCriteriaId": "6411CD53-1B04-4F13-82B6-F705FE74DAFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.1_07:*:windows:*:*:*:*:*",
              "matchCriteriaId": "43DBA862-7CC3-4CCA-94C9-AC34F11DF962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:*:linux:*:*:*:*:*",
              "matchCriteriaId": "1D1C4B12-6949-4399-BC8D-3B018213FF0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "C2D0C960-CB1B-497A-AD00-23DAA9F1B091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:*:windows:*:*:*:*:*",
              "matchCriteriaId": "905D148D-1D5E-4B43-AA1C-9B2CA11C03FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update1:linux:*:*:*:*:*",
              "matchCriteriaId": "6A6BFFD2-ECBC-4018-BABB-CA5F37530C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update1:solaris:*:*:*:*:*",
              "matchCriteriaId": "FA51551F-38C8-457C-81FC-5F98722049B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update1:windows:*:*:*:*:*",
              "matchCriteriaId": "51021C43-C439-4D09-AE5F-88A5FAFDBDD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update2:linux:*:*:*:*:*",
              "matchCriteriaId": "CF77B446-426C-4480-9B9A-DD98F7ED82AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update2:solaris:*:*:*:*:*",
              "matchCriteriaId": "0A82749B-D28A-4C59-B30F-63092B139C2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update2:windows:*:*:*:*:*",
              "matchCriteriaId": "9705C47F-ED59-42A0-8B75-C534C7C982CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update3:linux:*:*:*:*:*",
              "matchCriteriaId": "3F89801B-0FDF-4520-BDEE-ED6ED1BF49F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update3:solaris:*:*:*:*:*",
              "matchCriteriaId": "886CC1D0-D7FB-4363-AC4E-AC8DFD37CBF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update3:windows:*:*:*:*:*",
              "matchCriteriaId": "FC2844D6-9C67-4CAC-BCEB-0B15BEBC231F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update4:linux:*:*:*:*:*",
              "matchCriteriaId": "82AD9323-B175-4A1B-A4E0-2EF8C60D39E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update4:solaris:*:*:*:*:*",
              "matchCriteriaId": "A68926C4-4C4D-4BE9-8EF3-10C1E3479BE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update4:windows:*:*:*:*:*",
              "matchCriteriaId": "5F6BBD71-9910-457B-A884-7EABC3C34EC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update5:linux:*:*:*:*:*",
              "matchCriteriaId": "ED0E85FE-C504-451C-BD01-2F942D4F67C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update5:solaris:*:*:*:*:*",
              "matchCriteriaId": "7258FCF5-CBC2-4392-BDA9-142FD6E40E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:jre:1.4.2:update5:windows:*:*:*:*:*",
              "matchCriteriaId": "8A7FC1CD-A1CF-4E8C-97EE-97231B8F22AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "593124AA-5952-4A7E-AB55-D5D851C5DE0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:8.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "F66D6BB6-2355-4644-8A18-725F9E970EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:8.0:*:windows_2000_nt:*:*:*:*:*",
              "matchCriteriaId": "AD892E2E-E1C9-49A2-A42C-3B56F2B0BA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "647BA336-5538-4972-9271-383A0EC9378E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*",
              "matchCriteriaId": "D73D159B-C3D8-4BBD-8BAA-E9E8D3AD3A04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5400:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1B7CF42-F93E-48E6-BCD2-30B357F80DDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5400:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA896DF0-76AD-4CEE-9FE0-5E6758FC9A68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages."
    }
  ],
  "id": "CVE-2004-1029",
  "lastModified": "2024-11-20T23:49:56.530",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2005-03-01T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jouko.iki.fi/adv/javaplugin.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/13271"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29035"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/61"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101523-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21257249"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.idefense.com/application/poi/display?id=158\u0026type=vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/760344"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12317"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0599"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18188"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5674"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jouko.iki.fi/adv/javaplugin.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2005/Feb/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/13271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/61"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101523-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21257249"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.idefense.com/application/poi/display?id=158\u0026type=vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/760344"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/0599"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18188"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5674"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-11-23 00:03
Modified
2024-11-21 00:02
Severity ?
Summary
Buffer overflow in the Internet Key Exchange version 1 (IKEv1) implementation in Symantec Dynamic VPN Services, as used in Enterprise Firewall, Gateway Security, and Firewall /VPN Appliance products, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:8.0:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "F66D6BB6-2355-4644-8A18-725F9E970EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:8.0:*:windows:*:*:*:*:*",
              "matchCriteriaId": "055150B1-5B11-48D1-932C-26C85DF44E07",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:symantec:firewall_vpn_appliance_100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5851263-81A6-40AE-8486-E919D5279CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:firewall_vpn_appliance_200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E0D3199-365E-4D26-8D23-6492832EF096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_300:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F982965-056D-4253-9CEA-31424AF4B55F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_400:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF372CA-8FC2-47DD-A3A1-E437CC7D80CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5000_series:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2362A590-7443-4E50-8F8F-D89165B4F2C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F82B2D6F-EF56-4B62-9784-CF826AC480CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5300:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EDDB133-A6C8-45B4-9988-3D3D2F3952E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5310:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "77DA55C0-AD93-429D-AC52-E1E0F35C25D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5400:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA896DF0-76AD-4CEE-9FE0-5E6758FC9A68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the Internet Key Exchange version 1 (IKEv1) implementation in Symantec Dynamic VPN Services, as used in Enterprise Firewall, Gateway Security, and Firewall /VPN Appliance products, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1."
    }
  ],
  "id": "CVE-2005-3768",
  "lastModified": "2024-11-21T00:02:38.070",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-11-23T00:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17684"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.21.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015247"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015248"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015249"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2005/2517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17684"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.11.21.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015248"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015249"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2005/2517"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:55
Severity ?
Summary
Unknown vulnerability in the DNSd proxy, as used in Symantec Gateway Security 5400 2.x and 5300 1.x, Enterprise Firewall 7.0.x and 8.x, and VelociRaptor 1100/1200/1300 1.5, allows remote attackers to poison the DNS cache and redirect users to malicious sites.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "55B40C3E-2794-4310-97BC-D80069992C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:enterprise_firewall:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "593124AA-5952-4A7E-AB55-D5D851C5DE0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:velociraptor:model_1300:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A2EDF6-46FF-4EF5-A37A-AAD06B9A51D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5300:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EDDB133-A6C8-45B4-9988-3D3D2F3952E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5400:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1B7CF42-F93E-48E6-BCD2-30B357F80DDA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unknown vulnerability in the DNSd proxy, as used in Symantec Gateway Security 5400 2.x and 5300 1.x, Enterprise Firewall 7.0.x and 8.x, and VelociRaptor 1100/1200/1300 1.5, allows remote attackers to poison the DNS cache and redirect users to malicious sites."
    }
  ],
  "id": "CVE-2005-0817",
  "lastModified": "2024-11-20T23:55:58.040",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0225.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/14595"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.15.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1013451"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.isc.sans.org/diary.php?date=2005-03-04"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16423"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44530"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2004-06/0225.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/14595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.15.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1013451"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.isc.sans.org/diary.php?date=2005-03-04"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16423"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44530"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-10-05 21:17
Modified
2024-11-21 00:25
Severity ?
Summary
Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives.
Impacted products
Vendor Product Version
symantec antivirus_scan_engine 4.0
symantec antivirus_scan_engine 4.0
symantec antivirus_scan_engine 4.1
symantec antivirus_scan_engine 4.1.8
symantec antivirus_scan_engine 4.3
symantec antivirus_scan_engine 4.3
symantec antivirus_scan_engine 4.3
symantec antivirus_scan_engine 4.3
symantec antivirus_scan_engine 4.3
symantec antivirus_scan_engine 4.3.3
symantec antivirus_scan_engine 4.3.7.27
symantec antivirus_scan_engine 4.3.8.29
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 4.3.12
symantec antivirus_scan_engine 5.0
symantec antivirus_scan_engine 5.0.1
symantec brightmail_antispam 4.0
symantec brightmail_antispam 5.5
symantec brightmail_antispam 6.0
symantec brightmail_antispam 6.0.1
symantec brightmail_antispam 6.0.2
symantec brightmail_antispam 6.0.3
symantec brightmail_antispam 6.0.4
symantec client_security 2.0
symantec client_security 2.0
symantec client_security 2.0
symantec client_security 2.0.1_build_9.0.1.1000
symantec client_security 2.0.2_build_9.0.2.1000
symantec client_security 2.0.3_build_9.0.3.1000
symantec client_security 2.0.4
symantec client_security 2.0.4
symantec client_security 2.0.5_build_1100_mp1
symantec client_security 2.0.6
symantec client_security 3.0
symantec client_security 3.0.0.359
symantec client_security 3.0.1.1000
symantec client_security 3.0.1.1001
symantec client_security 3.0.1.1007
symantec client_security 3.0.1.1008
symantec client_security 3.0.2.2000
symantec client_security 3.0.2.2001
symantec client_security 3.0.2.2002
symantec client_security 3.0.2.2010
symantec client_security 3.0.2.2011
symantec client_security 3.0.2.2020
symantec client_security 3.0.2.2021
symantec client_security 3.1
symantec client_security 3.1.394
symantec client_security 3.1.396
symantec client_security 3.1.400
symantec client_security 3.1.401
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0
symantec mail_security 4.0.1
symantec mail_security 4.1
symantec mail_security 4.1
symantec mail_security 4.1
symantec mail_security 4.5
symantec mail_security 4.5.4.743
symantec mail_security 4.5_build_719
symantec mail_security 4.5_build_736
symantec mail_security 4.5_build_741
symantec mail_security 4.6.1.107
symantec mail_security 4.6.3
symantec mail_security 4.6_build_97
symantec mail_security 5.0
symantec mail_security 5.0
symantec mail_security 5.0.0.204
symantec mail_security 5.0.1
symantec mail_security 5.1.0
symantec mail_security 6.0.0
symantec norton_antivirus *
symantec norton_antivirus 9.0
symantec norton_antivirus 9.0
symantec norton_antivirus 9.0.0
symantec norton_antivirus 9.0.0.338
symantec norton_antivirus 9.0.1
symantec norton_antivirus 9.0.1.1.1000
symantec norton_antivirus 9.0.2
symantec norton_antivirus 9.0.2.1000
symantec norton_antivirus 9.0.3
symantec norton_antivirus 9.0.3.1000
symantec norton_antivirus 9.0.4
symantec norton_antivirus 9.0.4
symantec norton_antivirus 9.0.5
symantec norton_antivirus 9.0.5.1100
symantec norton_antivirus 9.0.6.1000
symantec norton_antivirus 10.0
symantec norton_antivirus 10.0
symantec norton_antivirus 10.0.0
symantec norton_antivirus 10.0.0.359
symantec norton_antivirus 10.0.1
symantec norton_antivirus 10.0.1.1000
symantec norton_antivirus 10.0.1.1007
symantec norton_antivirus 10.0.1.1008
symantec norton_antivirus 10.0.2.2000
symantec norton_antivirus 10.0.2.2001
symantec norton_antivirus 10.0.2.2002
symantec norton_antivirus 10.0.2.2010
symantec norton_antivirus 10.0.2.2011
symantec norton_antivirus 10.0.2.2020
symantec norton_antivirus 10.0.2.2021
symantec norton_antivirus 10.1
symantec norton_antivirus 10.1.4
symantec norton_antivirus 10.1.4
symantec norton_antivirus 10.1.4.4010
symantec norton_antivirus 10.1.394
symantec norton_antivirus 10.1.396
symantec norton_antivirus 10.1.400
symantec norton_antivirus 10.1.401
symantec norton_antivirus 10.9.1
symantec norton_antivirus 2004
symantec norton_antivirus 2004
symantec norton_antivirus 2005
symantec norton_antivirus 2005
symantec norton_antivirus 2005
symantec norton_antivirus 2005
symantec norton_antivirus 2006
symantec norton_internet_security 3.0
symantec norton_internet_security 2004
symantec norton_internet_security 2004
symantec norton_internet_security 2005
symantec norton_internet_security 2005
symantec norton_internet_security 2005
symantec norton_internet_security 2005
symantec norton_internet_security 2005
symantec norton_internet_security 2006
symantec norton_internet_security 2006
symantec norton_personal_firewall 2006
symantec norton_personal_firewall 2006_9.1.0.33
symantec norton_personal_firewall 2006_9.1.1.7
symantec norton_system_works 3.0
symantec norton_system_works 2004
symantec norton_system_works 2005
symantec norton_system_works 2005
symantec norton_system_works 2005
symantec norton_system_works 2005
symantec norton_system_works 2006
symantec symantec_antivirus_filtering_\+for_domino 3.0.12
symantec web_security 2.5
symantec web_security 3.0
symantec web_security 3.0.1
symantec web_security 3.0.1.70
symantec web_security 3.0.1.76
symantec web_security 3.0.1_build_3.01.70
symantec web_security 3.0.1_build_3.01.72
symantec web_security 3.0.1_build_3.01.74
symantec web_security 3.01.59
symantec web_security 3.01.60
symantec web_security 3.01.61
symantec web_security 3.01.62
symantec web_security 3.01.63
symantec web_security 3.01.67
symantec web_security 3.01.68
symantec web_security 5.0
symantec gateway_security_5000_series 3.0.1
symantec gateway_security_5400 2.0.1
symantec mail_security_8820_appliance *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2AD14C-2BD2-4658-BDB0-232A9E26EA2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:clearswift:*:*:*:*:*",
              "matchCriteriaId": "1E739083-DFC2-4A89-9F84-E067E127D420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65DC45B-8FA9-453E-8249-45535EA64D34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9DA3717-A218-459B-891C-F3F945D42A22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F11687CE-E997-4D26-ACAE-B9175348ADDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:caching:*:*:*:*:*",
              "matchCriteriaId": "2F90AD67-02CB-4006-B567-631FD633DB17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:clearswift:*:*:*:*:*",
              "matchCriteriaId": "BC0F87D0-E4B5-41FC-8050-386B9CE04249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:microsoft_sharepoint:*:*:*:*:*",
              "matchCriteriaId": "FBBFF303-3DD6-4312-94CD-37E5170A93AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:network_attached_storage:*:*:*:*:*",
              "matchCriteriaId": "59962A9A-10F4-4F1B-A5AB-8743C0874963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "346F8C27-F389-412C-B7C2-2CF3344E557C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.7.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "51170553-03E8-4588-97A0-8DA57C37B5E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.8.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "A32C5A4C-9E39-4718-8BF1-283183B4A516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "301B1340-A402-4D3E-AAF8-17CD8B59517D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:caching:*:*:*:*:*",
              "matchCriteriaId": "52CE5595-323D-45A2-BD05-C6B2CBD6BA38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:clearswift:*:*:*:*:*",
              "matchCriteriaId": "3042D5B7-AE27-4664-87DB-679422029199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:messaging:*:*:*:*:*",
              "matchCriteriaId": "671CBE65-1FCF-43B8-8D21-5C8CC7C17417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:microsoft_sharepoint:*:*:*:*:*",
              "matchCriteriaId": "28BD859A-F57B-444C-8083-AE99E59B9DC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:network_attached_storage:*:*:*:*:*",
              "matchCriteriaId": "6158E16F-468A-4B76-8199-500FCAC1E54D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "992DB720-52A8-43D4-B74B-96C0F763ED0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "685F58DC-6BD3-499C-A9D5-BB9C909FE857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "95436CD6-8E9C-4F89-9683-0650F6167027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC910CFD-9F20-473E-BC2D-64A7A3C14404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "849782E0-9F26-411F-82B9-88B5FC4F4C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAD87DB3-45C2-4091-A83B-25E427563C70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0910781-9EF9-4188-AA33-1C54F01A0832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7647813B-2B9F-4B0F-96D1-C533A49DDC6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "09AD23D0-4502-4090-9172-002B92D83C09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:scf_7.1:*:*:*:*:*",
              "matchCriteriaId": "97AF14CF-3BD6-4A03-B543-3150C656198E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0:build_9.0.0.338:stm:*:*:*:*:*",
              "matchCriteriaId": "8A1E2653-A061-48BD-AC62-643CDD78E859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.1_build_9.0.1.1000:mr1:*:*:*:*:*:*",
              "matchCriteriaId": "D934F853-C7E0-421E-9AF3-B7B49228722F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.2_build_9.0.2.1000:mr2:*:*:*:*:*:*",
              "matchCriteriaId": "D608AACF-A4BC-49CE-BE49-E8F3AEF31DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.3_build_9.0.3.1000:mr3:*:*:*:*:*:*",
              "matchCriteriaId": "3238894A-3C25-4CC8-A319-8AA7246FEC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D86F7A-F2C0-471C-8EA8-E1C7230F25AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:mr4_build1000:*:*:*:*:*:*",
              "matchCriteriaId": "11C1491F-01A1-47B1-87BB-6F7676448A2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.5_build_1100_mp1:mr5:*:*:*:*:*:*",
              "matchCriteriaId": "9204DC08-0809-4762-B5CB-5485E67CA31D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:2.0.6:mr6:*:*:*:*:*:*",
              "matchCriteriaId": "841CF36F-14A0-49A6-8442-681F25DC8DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB1C90D-DBC0-4DA0-AF5D-E42C41E84B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*",
              "matchCriteriaId": "2852548A-39A6-44FB-A73E-96507BA0CD8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB9641FC-FF7B-4413-8163-B795AA35C888",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*",
              "matchCriteriaId": "17862D7F-7001-46B8-A415-2A15A247E9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*",
              "matchCriteriaId": "170AEE7B-31AF-44E2-9B63-9703D0DE721C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*",
              "matchCriteriaId": "63B1A9FC-707C-4F6F-959B-30B28E43D202",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E4E013-A819-42E0-8F8E-9B2D409F900E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*",
              "matchCriteriaId": "097B87A8-8176-4426-BDE4-6FDDD272E1B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EBD7767-C352-435B-8963-83F723FFD302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2FC1708-B643-4489-A59C-EBDAFD9B0078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCE0C8A-A97C-4DE1-B0EE-3A2D16A34C77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE714705-CEE9-4BA1-8573-FD3765BC7F94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6090F86-0B42-403F-9996-9B7670EBAA5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.396:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3706E76-FC65-467E-8D09-A9EAC32E9BBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF555313-BB5A-4D8A-A3A1-609ABC39F6FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC74372F-329A-4597-810B-88B865771C9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:*:domino:*:*:*:*:*",
              "matchCriteriaId": "DA6CFDFD-1EB4-458A-AD39-320E619593D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "05B85F14-4248-4550-BE7F-D9BAB9DC90C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build456:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "419D2E24-CA90-471D-9F35-1795F6A65B60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build463:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "965DA3C4-7559-4583-A5DC-BEABEAA7E87B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build465:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "EBEB8E8E-DB27-45FB-90CA-2CF3A515AC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build736:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "8184E073-37B0-4654-8DF8-379EFC5FB0D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build741:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "C29B7C1F-C4AB-4CAB-8177-B64F4B8A2B26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build743:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "D1FBFE00-4692-48C2-A6C7-9179E185A275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.0.1:*:domino:*:*:*:*:*",
              "matchCriteriaId": "DBE74BFA-003E-40CC-83E1-1AC7159B0C1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build458:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "E21CDCBA-3C86-462B-8383-58C893978EBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build459:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "E6179A68-2322-4D79-9446-5A5E4B27AD33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build461:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "EE92421B-C0CA-4B28-9E26-EF0A115C9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.5:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "DC8AD646-E257-4065-B358-8B4944D327E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.5.4.743:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "F50BA510-67D5-4FF1-87D0-215B68D20EA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_719:*:exchange:*:*:*:*:*",
              "matchCriteriaId": "5CA62889-7A55-459F-BFD8-D38CD93F9219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_736:*:exchange:*:*:*:*:*",
              "matchCriteriaId": "766327B9-E8DA-4422-80C2-48E333161D0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_741:*:exchange:*:*:*:*:*",
              "matchCriteriaId": "3C5FF883-831F-47CC-BD04-BBFD25BDE8DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.6.1.107:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "C6EAA83D-2073-4360-BD3C-59AF34EADE1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.6.3:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "60D239DF-65AD-4492-AEE1-FCD36E99DD63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:4.6_build_97:*:exchange:*:*:*:*:*",
              "matchCriteriaId": "7AD92ABA-2D03-46FD-85D5-33FC369015DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "9608BF57-0D9A-4874-BFDA-C92447FACD70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:smtp:*:*:*:*:*",
              "matchCriteriaId": "96E660E2-C0F9-499F-A01D-DB368179F28F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0.204:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "8E1C4824-3774-41EF-80E1-42A417830978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*",
              "matchCriteriaId": "A8430D5E-A8A7-4724-8A6B-B5E2CA437729",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:5.1.0:*:domino:*:*:*:*:*",
              "matchCriteriaId": "A3D2C4B6-2F13-4487-989E-AC247D4D011A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:mail_security:6.0.0:*:microsoft_exchange:*:*:*:*:*",
              "matchCriteriaId": "091D4557-21F6-412F-933A-9F0FD8152E28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:*:*:corporate_edition_for_linux:*:*:*:*:*",
              "matchCriteriaId": "2CC0DE59-149C-42DD-9516-BDB79A9BC412",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "88FE6753-A619-4703-8120-F23EEC8C48EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "497635AC-D7F2-4A5C-8C37-DA493C9681A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "E72D8D65-340C-4505-AA80-F9E7870513EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "774AD674-895A-4242-9AC9-BAD6CB862785",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "242D33E8-1B6B-4562-9F2A-1B34E3B7BC71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "C9797D21-CD64-4B61-A4C1-AC4AD3F9B3D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "252ACD1B-323F-4139-880D-89D600F29986",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "618F6F78-566A-4901-8B57-BB6DCAC7E892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "B2D0922A-3EA3-4BC9-9311-9DCA57338CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "EB7F329F-4390-4735-B2C2-BC6A72FBE36A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "A5D058F6-779B-4ED4-ADC7-A68491F72BAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:mr4_build_1000:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "29E1AF72-6D48-4DAF-904A-B55366189251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "4B5EE3B2-FF16-4231-B99D-81CB10239576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "7D26AB91-36AB-4BF6-9D0D-098F04C60AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.6.1000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "E5E0AB4E-4DD0-4D87-BBE5-B459A8B7301F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "4433613D-EB44-4D60-861F-F9FFA2ED4F6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "7225A578-8F62-42BD-99AC-D3385478613A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "FF0903BD-3E78-4024-A773-16100F519B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.0.359:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "BF18D806-E781-4F17-9341-D48CBC06949E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "1B390577-F1F1-4821-90FB-967E749F7CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "88AA69B4-865C-4959-9681-62A7591D6CFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1007:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "55EDC888-F593-49E8-95A4-87D8FE9CC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1008:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "B7A47F4F-DC34-4B7D-9C3A-4631FFFC1142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2000:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "B70ACBE6-C754-4A6F-AC2F-89657DA179E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2001:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "8C6C2421-5651-4B3F-9DBC-DC411C989BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2002:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "5B967B9A-215D-470A-9722-5782D0AE0980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "F4BFDD98-F70E-41A9-9245-7EC5D140D4F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2011:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "DFC9BF64-65E7-4E0E-A637-13794A02CEED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "6B188333-A087-4FC7-864B-F802932455F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "A33A8A08-F356-4616-A603-00ADCC062D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "B5889206-CE1C-489B-8984-EE4055BBC6BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "62EA1AE0-6A8B-4C13-B95D-7F9694AD5535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4:mr4_mp1_build4010:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "B31249CA-296D-42C2-8939-61B990559BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4.4010:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "5C6B6D3A-715A-45B9-8231-77A6DE847973",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.394:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "73A3CB7B-DD39-48E7-8D33-1E222933A7D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.396:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "116F0C9D-9255-4B98-B1CF-C78A96240784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.400:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "A8957B43-0673-439F-86F6-5791372BA498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.401:*:corporate_edition:*:*:*:*:*",
              "matchCriteriaId": "D2ACD718-6232-463A-ACEE-B06A02D3243A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.9.1:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "44073E2A-A8AB-4D1A-BCFC-8439E40E97E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5E129A-4FA8-4084-92BE-5A65FABD53DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:professional:*:*:*:*:*",
              "matchCriteriaId": "C2E302A4-72F8-478B-9FA2-2536902986B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*",
              "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:professional:*:*:*:*:*",
              "matchCriteriaId": "3967227C-FCB1-486E-A6C4-43B8004C4A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:11.0:*:*:*:*:*:*",
              "matchCriteriaId": "894F1929-1029-4B57-A66A-EA58F7D94D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:11.0.9:*:*:*:*:*:*",
              "matchCriteriaId": "C532E93A-5D0D-454D-8B14-F5E9C6A0499F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:3.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "D2259605-B720-42B0-8476-6CAE07C7B143",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*",
              "matchCriteriaId": "09CA1AC8-E273-44C1-9D1C-19542EB57433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:professional:*:*:*:*:*",
              "matchCriteriaId": "E4BBE123-56E1-46E0-93BE-38F0932D9C63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.0:*:*:*:*:*:*",
              "matchCriteriaId": "F39AE3D7-7018-47AB-B332-D40EA5273CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.0.9:*:*:*:*:*:*",
              "matchCriteriaId": "82446BA3-92F9-4689-9D67-3CE159AA0F49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.5.6.14:*:*:*:*:*:*",
              "matchCriteriaId": "98F9F2E3-1775-4EF9-9FE0-0D011307C269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:professional:*:*:*:*:*",
              "matchCriteriaId": "1DE91FB9-35C3-4DC7-BE00-7C60EE9FD880",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E8C73F1-FEF1-40A3-BFAB-CE226B98E001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FC50007-59F4-45B0-BABF-BCF2CAB4A9B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:3.0:*:macintosh:*:*:*:*:*",
              "matchCriteriaId": "F648A08A-24EF-45A5-B7FD-00CAD5892061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "F589D9AA-FD1B-4929-93DC-801C36087E64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*",
              "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:premier:*:*:*:*:*",
              "matchCriteriaId": "CBB1521D-B16D-4E28-8723-AF96E95D7596",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:11.0:*:*:*:*:*:*",
              "matchCriteriaId": "67EECA52-EECB-4AAA-85F9-ADBE028B8068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:11.0.9:*:*:*:*:*:*",
              "matchCriteriaId": "CE8022C6-360B-4A3D-AD70-3DC79B339231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:symantec_antivirus_filtering_\\+for_domino:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "37AE8BC0-663C-4D1D-8FF5-13F682BBEE79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "60B08F85-A0E6-4984-83E9-41CD29751BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "690F3A5F-F990-41C9-9964-B033188C86F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E4FAC8-2893-48FA-B159-49C8AA380338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D37768F-A43C-420E-85CA-A5EF3E30F47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABE3F492-D08F-4558-BC19-F33BBB0D55A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4CD5C31-4F4A-44F1-A3E1-2B4BB78E152D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "F39BAADB-6BF1-4871-ABEC-4BFA1321FE59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "451A414E-1A02-45D1-8DFC-61B3E17BF12A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "B05B8522-E203-49A0-8C5B-3DA7B06AF5AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD064CE-3C39-4243-B59E-CC8E48ED50DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "9886B467-793C-4D07-9B1B-B80FA5266D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "676F5A96-B21B-49FF-86EA-F18F9C3931C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "18991132-C5B6-43AB-BDCB-196BB2957F27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "42CE2596-83A9-4A80-A8C6-825EDEAAB8B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:3.01.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA16BAF-6263-44EA-B3EB-187264913D8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:web_security:5.0:*:microsoft_isa_2004:*:*:*:*:*",
              "matchCriteriaId": "8E7C32F4-1225-4A4E-BD98-DFE026383482",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5000_series:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76147168-37FB-444C-BD40-EFC31A0A499A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:gateway_security_5400:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA896DF0-76AD-4CEE-9FE0-5E6758FC9A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:mail_security_8820_appliance:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "823BD557-6352-4EC2-AE78-2C0CE6F660D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en el componente Decomposer en m\u00faltiples producto Symantec que permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de archivos .CAB manipulados."
    }
  ],
  "id": "CVE-2007-0447",
  "lastModified": "2024-11-21T00:25:53.100",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-10-05T21:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/36118"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26053"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24282"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2508"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/36118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26053"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24282"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2508"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}