Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wingate vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-1999-0291
The WinGate proxy is installed without a password, which allows remote malicious users to redirect connections without authentication.
Qbik Wingate
5
CVSSv2
CVE-1999-0441
Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.
Qbik Wingate 3.0
1 EDB exploit
7.2
CVSSv2
CVE-2020-13866
WinGate v9.4.1.5998 has insecure permissions for the installation directory, which allows local users to gain privileges by replacing an executable file with a Trojan horse.
Qbik Wingate 9.4.1.5998
7.5
CVSSv2
CVE-2006-2926
Stack-based buffer overflow in the WWW Proxy Server of Qbik WinGate 6.1.1.1077 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a long URL HTTP request.
Qbik Wingate 6.1.1.1077
2 EDB exploits
5
CVSSv2
CVE-2004-0789
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and previous versions as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x prior to 2.2.3 and 3.5.x prior to 3.5.2, allow remote malicious users to cause a ...
Delegate Delegate 7.8.1
Delegate Delegate 7.8.2
Delegate Delegate 8.9.1
Delegate Delegate 8.9.2
Dnrd Dnrd 1.3
Dnrd Dnrd 1.4
Dnrd Dnrd 2.0
Dnrd Dnrd 2.6
Dnrd Dnrd 2.7
Don Moore Mydns 0.9
Maradns Maradns 0.5.28
Posadis Posadis 0.50.6
Posadis Posadis 0.50.7
Qbik Wingate 3.0
Qbik Wingate 4.0.1
Delegate Delegate 7.7.1
Delegate Delegate 7.8.0
Delegate Delegate 8.5.0
Delegate Delegate 8.9
Dnrd Dnrd 1.1
Dnrd Dnrd 1.2
Dnrd Dnrd 2.4
NA
CVE-1999-0657
WinGate is being used.
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2