[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:60608
Qbik WinGate (64 bit) is installed

oval:org.secpod.oval:def:60613
The host is installed with Qbik WinGate 6.1.1.1077 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a issue in the WWW Proxy Server. Successful exploitation could allow remote attackers to cause a denial of service and possibly ...

oval:org.secpod.oval:def:60611
The host is installed with Qbik WinGate through 6.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a self-referencing compressed name pointer. Successful exploitation could allow remote attackers to cause a denial of service ...

oval:org.secpod.oval:def:60609
The host is installed with Qbik WinGate through 6.2.2.1137 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a issue in the IMAP service. Successful exploitation could allow remote attackers to cause a denial of service (resource ...

oval:org.secpod.oval:def:60610
The host is installed with Qbik WinGate 5.x or 6.x before 6.2.2 and is prone to a format string vulnerability. A flaw is present in the application, which fails to handle a issue in the SMTP server component. Successful exploitation could allow remote attackers to cause a denial of service (service ...

oval:org.secpod.oval:def:60612
The host is installed with Qbik WinGate 6.1.2.1094 or 6.1.3.1096 and is prone to a directory traversal vulnerability. A flaw is present in the application, which fails to handle a issue in the IMAP service. Successful exploitation could allow remote attackers to read email of other users, or perform ...

oval:org.secpod.oval:def:60606
The host is installed with Qbik WinGate 6.x through 6.5.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle the HTTP Host header. Successful exploitation could allow remote attackers to bypass access controls for Flash, Java, Silver ...

oval:org.secpod.oval:def:92103
The host is installed with Qbik Wingate 9.4.1.5998 and is prone an incorrect permission assignment for critical resource vulnerability. A flaw is present in the applications which fails to properly handle replacing an executable file. Successful exploitation allows local users to gain privileges by ...

*CPE
cpe:/a:qbik:wingate:::x64

© SecPod Technologies