cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2002-1463,https://securityvulnerability.io/vulnerability/CVE-2002-1463,,"Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote attackers to spoof connections.",Symantec,"Enterprise Firewall,Velociraptor,Raptor Firewall",,,0.0018500000005587935,false,,false,false,false,,,false,false,,2003-06-09T04:00:00.000Z,0 CVE-2002-1535,https://securityvulnerability.io/vulnerability/CVE-2002-1535,,"Secure Webserver 1.1 in Raptor 6.5 and Symantec Enterprise Firewall 6.5.2 allows remote attackers to identify IP addresses of hosts on the internal network via a CONNECT request, which generates different error messages if the host is present.",Symantec,"Raptor Firewall,Enterprise Firewall",,,0.0016299999551847577,false,,false,false,false,,,false,false,,2003-03-31T05:00:00.000Z,0 CVE-2002-2294,https://securityvulnerability.io/vulnerability/CVE-2002-2294,,"Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd).",Symantec,"Enterprise Firewall,Raptor Firewall,Velociraptor",,,0.001290000043809414,false,,false,false,false,,,false,false,,2002-12-31T05:00:00.000Z,0 CVE-2002-0990,https://securityvulnerability.io/vulnerability/CVE-2002-0990,,"The web proxy component in Symantec Enterprise Firewall (SEF) 6.5.2 through 7.0, Raptor Firewall 6.5 and 6.5.3, VelociRaptor, and Symantec Gateway Security allow remote attackers to cause a denial of service (connection resource exhaustion) via multiple connection requests to domains whose DNS server is unresponsive or does not exist, which generates a long timeout.",Symantec,"Velociraptor,Enterprise Firewall,Raptor Firewall",,,0.0016899999463930726,false,,false,false,false,,,false,false,,2002-10-28T05:00:00.000Z,0 CVE-2002-0538,https://securityvulnerability.io/vulnerability/CVE-2002-0538,,"FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's ""FTP PORT"" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the ""FTP bounce"" vulnerability.",Symantec,"Velociraptor,Enterprise Firewall,Raptor Firewall",,,0.001820000004954636,false,,false,false,false,,,false,false,,2002-07-03T04:00:00.000Z,0 CVE-2001-0483,https://securityvulnerability.io/vulnerability/CVE-2001-0483,,Configuration error in Axent Raptor Firewall 6.5 allows remote attackers to use the firewall as a proxy to access internal web resources when the http.noproxy Rule is not set.,Symantec,Raptor Firewall,,,0.003269999986514449,false,,false,false,false,,,false,false,,2001-06-18T04:00:00.000Z,0