bug-bounty458
google364
microsoft314
facebook272
xss250
apple179
malware176
rce165
exploit141
cve111
account-takeover104
bragging-post101
phishing84
privilege-escalation81
csrf81
supply-chain68
stored-xss65
authentication-bypass63
dos63
browser62
reflected-xss57
react54
cloudflare51
reverse-engineering49
cross-site-scripting48
input-validation48
aws48
docker47
node47
access-control47
smart-contract45
web343
ethereum43
sql-injection43
web-security42
ssrf42
defi42
web-application41
oauth37
writeup37
race-condition36
burp-suite35
vulnerability-disclosure34
info-disclosure34
idor34
html-injection33
cloud33
auth-bypass33
lfi32
smart-contract-vulnerability32
0
7/10
vulnerability
Symantec Messaging Gateway versions ≤10.6.5 contain an authentication bypass in the password reset feature due to encryption of password reset tokens using a hardcoded static key with weak PBEWithMD5AndDES cipher. An attacker can craft a valid administrator session by encrypting the string 'admin:' and passing it as an authorization parameter.
authentication-bypass
hardcoded-credentials
weak-encryption
password-reset-flaw
pbe-with-md5-and-des
symantec-messaging-gateway
token-prediction
appliance-security
web-application
Symantec Messaging Gateway
Artem Kondratenko
Philip Pettersson
SYMSA1461
PBEWithMD5AndDES