Symantec Web Gateway 5.0.x file-management scripts allow remote code executio
Reporter | Title | Published | Views | Family All 17 |
---|---|---|---|---|
Tenable Nessus | Symantec Web Gateway upload_file() Remote Code Execution (SYM12-006) (intrusive check) | 21 May 201200:00 | – | nessus |
Tenable Nessus | Symantec Web Gateway < 5.0.3 Multiple Vulnerabilities (SYM12-006) (version check) | 21 May 201200:00 | – | nessus |
Dsquare | Symantec Web Gateway 5.0.2 File Upload | 9 Jun 201200:00 | – | dsquare |
Metasploit | Symantec Web Gateway 5.0.2.8 Arbitrary PHP File Upload Vulnerability | 9 Jun 201220:27 | – | metasploit |
NVD | CVE-2012-0299 | 21 May 201220:55 | – | nvd |
AttackerKB | Symantec Web Gateway upload_file Remote Code Execution Vulnerability | 21 May 201200:00 | – | attackerkb |
CVE | CVE-2012-0299 | 21 May 201220:55 | – | cve |
Packet Storm | Symantec Web Gateway 5.0.2.8 Arbitrary PHP File Upload Vulnerability | 11 Jun 201200:00 | – | packetstorm |
Check Point Advisories | Symantec Web Gateway 5.0.2.8 Arbitrary PHP File Upload (CVE-2012-0299) | 25 Nov 201200:00 | – | checkpoint_advisories |
Exploit DB | Symantec Web Gateway 5.0.2.8 - Arbitrary '.PHP' File Upload (Metasploit) | 10 Jun 201200:00 | – | exploitdb |
Source | Link |
---|---|
symantec | www.symantec.com/security_response/securityupdates/detail.jsp |
securityfocus | www.securityfocus.com/bid/53443 |
exchange | www.exchange.xforce.ibmcloud.com/vulnerabilities/75730 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo