bug-bounty438
google354
xss345
microsoft282
facebook246
apple172
exploit163
rce160
malware102
account-takeover95
cve91
csrf83
bragging-post80
writeup79
browser77
privilege-escalation68
react60
authentication-bypass57
cloudflare54
dos53
node52
ssrf51
docker51
phishing49
aws48
access-control47
smart-contract45
oauth45
supply-chain44
ethereum43
defi42
web342
sql-injection41
lfi37
idor34
smart-contract-vulnerability32
web-application31
race-condition31
reverse-engineering31
info-disclosure31
clickjacking31
wordpress30
vulnerability-disclosure30
cloud29
burp-suite28
information-disclosure28
solidity27
web-security27
ctf26
responsible-disclosure26
0
7/10
vulnerability
Symantec Messaging Gateway versions ≤10.6.5 contain an authentication bypass in the password reset feature due to encryption of password reset tokens using a hardcoded static key with weak PBEWithMD5AndDES cipher. An attacker can craft a valid administrator session by encrypting the string 'admin:' and passing it as an authorization parameter.
authentication-bypass
hardcoded-credentials
weak-encryption
password-reset-flaw
pbe-with-md5-and-des
symantec-messaging-gateway
token-prediction
appliance-security
web-application
Symantec Messaging Gateway
Artem Kondratenko
Philip Pettersson
SYMSA1461
PBEWithMD5AndDES