Symantec Web Gateway 5.0.x before 5.0.3 allows remote code execution by injecting or including crafted data in the management GUI
Reporter | Title | Published | Views | Family All 35 |
---|---|---|---|---|
![]() | Symantec Web Gateway 5.0.2 RCE | 9 Jun 201200:00 | – | dsquare |
![]() | Symantec Web Gateway 5.0.2 LFI | 9 Jun 201200:00 | – | dsquare |
![]() | Symantec Web Gateway access_log PHP Injection | 11 Jun 201200:00 | – | saint |
![]() | Symantec Web Gateway access_log PHP Injection | 11 Jun 201200:00 | – | saint |
![]() | Symantec Web Gateway access_log PHP Injection | 11 Jun 201200:00 | – | saint |
![]() | Symantec Web Gateway access_log PHP Injection | 11 Jun 201200:00 | – | saint |
![]() | Symantec Web Gateway 5.0.2.8 ipchange.php Command Injection | 10 Jun 201220:38 | – | metasploit |
![]() | Symantec Web Gateway 5.0.2.8 relfile File Inclusion Vulnerability | 28 May 201203:47 | – | metasploit |
![]() | Symantec Web Gateway 5.0.2.8 ipchange.php Command Injection | 11 Jun 201200:00 | – | packetstorm |
![]() | Symantec Web Gateway 5.0.2.8 Command Execution | 28 May 201200:00 | – | packetstorm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo