Download
| Alert*
oval:org.secpod.oval:def:7677
Symantec Messaging Gateway is installed oval:org.secpod.oval:def:7678 The host is installed with Symantec Messaging Gateway 9.5.x before 10.0 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to prevent to disclose excessive component versioning information. Successful exploitation allows attackers to obtain sensit ... oval:org.secpod.oval:def:7679 The host is installed with Symantec Messaging Gateway 9.5.x before 10.0 and is prone to security-bypass vulnerability. A flaw is present in the application, which fails to prevent the bypass of certain security restrictions. Successful exploitation allows remote authenticated users to modify the web ... oval:org.secpod.oval:def:7680 The host is installed with Symantec Messaging Gateway 9.5.x before 10.0 and is prone to privilege escalation vulnerability. A flaw is present in the application, which fails to handle a default password account. Successful exploitation allows remote attackers to obtain privileged access via an SSH s ... oval:org.secpod.oval:def:8175 The host is installed with Symantec Messaging Gateway 9.5 or 9.5.1 and is prone to multiple directory traversal vulnerabilities. The flaws are present in the application, which fails to sufficiently sanitize user-supplied input. Successful exploitation allows remote attackers to read arbitrary files ... oval:org.secpod.oval:def:7681 The host is installed with Symantec Messaging Gateway 9.5.x before 10.0 and is prone to cross-site request forgery (CSRF) vulnerability. A flaw is present in the application, which fails to handle administrator authentication. Successful exploitation allows remote attackers to hijack the authenticat ... oval:org.secpod.oval:def:7682 The host is installed with Symantec Messaging Gateway 9.5.x before 10.0 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to properly handle web content or mail content. Successful exploitation allows remote attackers to inject ... |