Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-0538
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
FTP proxy in Symantec Raptor Firewall 6.5.3 and Enterprise 7.0 rewrites an FTP server's "FTP PORT" responses in a way that allows remote attackers to redirect FTP data connections to arbitrary ports, a variant of the "FTP bounce" vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Symantec Raptor / Enterprise Firewall可被利用进行FTP Bounce攻击漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Raptor Firewall是一款企业级防火墙,由Axent Technologies开发及Symantec维护和分发,Symantec Enterprise Firewall以前命名为Raptor防火墙,可在Microsoft Windows和Unix操作系统下使用。 Raptor防火墙设计上存在漏洞,服务器可被利用做FTP Bounce攻击,可以导致攻击者利用此漏洞攻击防火墙保护的任意主机。 由于设计上的错误,攻击者可以先通过FTP服务器验证(匿名或者其他有效帐户),然后利用PORT命令使FTP S
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-0538
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-0538
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2002-0538

No comments yet


Leave a comment