Lucene search

K
SymantecMessaging Gateway

6 matches found

CVE
CVE
added 2012/08/29 10:56 a.m.51 views

CVE-2012-3579

Symantec Messaging Gateway (SMG) before 10.0 has a default password for an unspecified account, which makes it easier for remote attackers to obtain privileged access via an SSH session.

7.9CVSS6.6AI score0.36373EPSS
CVE
CVE
added 2016/04/22 6:59 p.m.45 views

CVE-2016-2203

The management console on Symantec Messaging Gateway (SMG) Appliance devices before 10.6.1 allows local users to discover an encrypted AD password by leveraging certain read privileges.

7.8CVSS7.5AI score0.37928EPSS
CVE
CVE
added 2019/12/11 4:15 p.m.43 views

CVE-2019-18377

Symantec Messaging Gateway, prior to 10.7.3, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

7.2CVSS7.4AI score0.0105EPSS
CVE
CVE
added 2017/06/26 9:29 p.m.42 views

CVE-2017-6324

The Symantec Messaging Gateway, when processing a specific email attachment, can allow a malformed or corrupted Word file with a potentially malicious macro through despite the administrator having the 'disarm' functionality enabled. This constitutes a 'bypass' of the disarm functionality resident ...

7.5CVSS8.3AI score0.00453EPSS
CVE
CVE
added 2019/12/11 4:15 p.m.40 views

CVE-2019-18379

Symantec Messaging Gateway, prior to 10.7.3, may be susceptible to a server-side request forgery (SSRF) exploit, which is a type of issue that can let an attacker send crafted requests from the backend server of a vulnerable web application or access services available through the loopback interfac...

7.5CVSS7.1AI score0.00932EPSS
CVE
CVE
added 2012/08/29 10:56 a.m.39 views

CVE-2012-3580

Symantec Messaging Gateway (SMG) before 10.0 allows remote authenticated users to modify the web application by leveraging access to the management interface.

7.7CVSS6.4AI score0.00897EPSS