Filtered by vendor Symantec
Subscriptions
Filtered by product Messaging Gateway
Subscriptions
Total
25 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2014-1648 | 1 Symantec | 1 Messaging Gateway | 2025-04-12 | N/A |
Cross-site scripting (XSS) vulnerability in brightmail/setting/compliance/DlpConnectFlow$view.flo in the management console in Symantec Messaging Gateway 10.x before 10.5.2 allows remote attackers to inject arbitrary web script or HTML via the displayTab parameter. | ||||
CVE-2016-2203 | 1 Symantec | 1 Messaging Gateway | 2025-04-12 | N/A |
The management console on Symantec Messaging Gateway (SMG) Appliance devices before 10.6.1 allows local users to discover an encrypted AD password by leveraging certain read privileges. | ||||
CVE-2016-2204 | 1 Symantec | 1 Messaging Gateway | 2025-04-12 | N/A |
The management console on Symantec Messaging Gateway (SMG) Appliance devices before 10.6.1 allows local users to obtain root-shell access via crafted terminal-window input. | ||||
CVE-2012-3580 | 1 Symantec | 1 Messaging Gateway | 2025-04-11 | N/A |
Symantec Messaging Gateway (SMG) before 10.0 allows remote authenticated users to modify the web application by leveraging access to the management interface. | ||||
CVE-2012-3581 | 1 Symantec | 1 Messaging Gateway | 2025-04-11 | N/A |
Symantec Messaging Gateway (SMG) before 10.0 allows remote attackers to obtain potentially sensitive information about component versions via unspecified vectors. | ||||
CVE-2012-4347 | 1 Symantec | 1 Messaging Gateway | 2025-04-11 | N/A |
Multiple directory traversal vulnerabilities in the management console in Symantec Messaging Gateway (SMG) 9.5.x allow remote authenticated users to read arbitrary files via a .. (dot dot) in the (1) logFile parameter in a logs action to brightmail/export or (2) localBackupFileSelection parameter in an APPLIANCE restoreSource action to brightmail/admin/restore/download.do. | ||||
CVE-2012-0308 | 1 Symantec | 1 Messaging Gateway | 2025-04-11 | N/A |
Cross-site request forgery (CSRF) vulnerability in Symantec Messaging Gateway (SMG) before 10.0 allows remote attackers to hijack the authentication of administrators. | ||||
CVE-2012-0307 | 1 Symantec | 1 Messaging Gateway | 2025-04-11 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Symantec Messaging Gateway (SMG) before 10.0 allow remote attackers to inject arbitrary web script or HTML via (1) web content or (2) e-mail content. | ||||
CVE-2012-3579 | 1 Symantec | 1 Messaging Gateway | 2025-04-11 | N/A |
Symantec Messaging Gateway (SMG) before 10.0 has a default password for an unspecified account, which makes it easier for remote attackers to obtain privileged access via an SSH session. | ||||
CVE-2022-25630 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | 5.4 Medium |
An authenticated user can embed malicious content with XSS into the admin group policy page. | ||||
CVE-2022-25629 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | 5.4 Medium |
An authenticated user who has the privilege to add/edit annotations on the Content tab, can craft a malicious annotation that can be executed on the annotations page (Annotation Text Column). | ||||
CVE-2019-9699 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | 4.5 Medium |
Symantec Messaging Gateway (prior to 10.7.0), may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data. | ||||
CVE-2019-18379 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | 7.3 High |
Symantec Messaging Gateway, prior to 10.7.3, may be susceptible to a server-side request forgery (SSRF) exploit, which is a type of issue that can let an attacker send crafted requests from the backend server of a vulnerable web application or access services available through the loopback interface. | ||||
CVE-2019-18378 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | 4.8 Medium |
Symantec Messaging Gateway, prior to 10.7.3, may be susceptible to a cross-site scripting (XSS) exploit, which is a type of issue that can enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to potentially bypass access controls such as the same-origin policy. | ||||
CVE-2019-18377 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | 7.2 High |
Symantec Messaging Gateway, prior to 10.7.3, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. | ||||
CVE-2018-12243 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | N/A |
The Symantec Messaging Gateway product prior to 10.6.6 may be susceptible to a XML external entity (XXE) exploit, which is a type of issue where XML input containing a reference to an external entity is processed by a weakly configured XML parser. The attack uses file URI schemes or relative paths in the system identifier to access files that should not normally be accessible. | ||||
CVE-2018-12242 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | N/A |
The Symantec Messaging Gateway product prior to 10.6.6 may be susceptible to an authentication bypass exploit, which is a type of issue that can allow attackers to potentially circumvent security mechanisms currently in place and gain access to the system or network. | ||||
CVE-2017-6326 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | N/A |
The Symantec Messaging Gateway can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process. | ||||
CVE-2017-6325 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | N/A |
The Symantec Messaging Gateway can encounter a file inclusion vulnerability, which is a type of vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. This file inclusion vulnerability subverts how an application loads code for execution. Successful exploitation of a file inclusion vulnerability will result in remote code execution on the web server that runs the affected web application. | ||||
CVE-2017-6324 | 1 Symantec | 1 Messaging Gateway | 2024-11-21 | N/A |
The Symantec Messaging Gateway, when processing a specific email attachment, can allow a malformed or corrupted Word file with a potentially malicious macro through despite the administrator having the 'disarm' functionality enabled. This constitutes a 'bypass' of the disarm functionality resident to the application. |