Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gateway vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-2961
SQL injection vulnerability in the management console in Symantec Web Gateway 5.0.x prior to 5.0.3.18 allows remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Symantec Web Gateway 5.0.2
Symantec Web Gateway 5.0.3
Symantec Web Gateway 5.0.1
Symantec Web Gateway 5.0
1 EDB exploit
NA
CVE-2012-2976
The management console in Symantec Web Gateway 5.0.x prior to 5.0.3.18 allows remote malicious users to execute arbitrary shell commands via crafted input to application scripts, related to an "injection" issue.
Symantec Web Gateway 5.0.3
Symantec Web Gateway 5.0.1
Symantec Web Gateway 5.0
Symantec Web Gateway 5.0.2
NA
CVE-2012-2977
The management console in Symantec Web Gateway 5.0.x prior to 5.0.3.18 allows remote malicious users to change arbitrary passwords via crafted input to an application script.
Symantec Web Gateway 5.0
Symantec Web Gateway 5.0.2
Symantec Web Gateway 5.0.3
Symantec Web Gateway 5.0.1
2 EDB exploits
7.5
CVSSv3
CVE-2021-38872
IBM DataPower Gateway 10.0.2.0, 10.0.3.0, 10.0.1.0 up to and including 10.0.1.4, and 2018.4.1.0 up to and including 2018.4.1.17 could allow a remote user to cause a denial of service by consuming resources with multiple requests. IBM X-Force ID: 208348.
Ibm Datapower Gateway 10.0.2.0
Ibm Datapower Gateway 10.0.3.0
Ibm Datapower Gateway
5.3
CVSSv3
CVE-2021-38910
IBM DataPower Gateway V10CD, 10.0.1, and 2108.4.1 could allow a remote malicious user to bypass security restrictions, caused by the improper validation of input. By sending a specially crafted JSON message, an attacker could exploit this vulnerability to modify structure and fie...
Ibm Datapower Gateway
Ibm Datapower Gateway 10.0.2.0
Ibm Datapower Gateway 10.0.3.0
NA
CVE-2008-2528
Unspecified vulnerability in Citrix Access Gateway Standard Edition 4.5.7 and previous versions and Advanced Edition 4.5 HF2 and previous versions allows malicious users to bypass authentication and gain "access to network resources" via unspecified vectors.
Citrix Access Gateway
Citrix Access Gateway 4.5.5
Citrix Access Gateway 4.5.6
NA
CVE-2007-4016
Unspecified vulnerability in the client components in Citrix Access Gateway Standard Edition prior to 4.5.5 and Advanced Edition prior to 4.5 HF1 allows malicious users to execute arbitrary code via unspecified vectors.
Citrix Access Gateway
Citrix Access Gateway 4.2
Citrix Access Gateway 4.0
NA
CVE-2010-2892
gsb/drivers.php in LANDesk Management Gateway 4.0 up to and including 4.0-1.48 and 4.2 up to and including 4.2-1.8 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the DRIVES parameter, as demonstrated by a cross-site request fo...
Landesk Management Gateway 4.0-1.48
Landesk Management Gateway 4.0
Landesk Management Gateway 4.2-1.8
Landesk Management Gateway 4.2
1 EDB exploit
NA
CVE-2012-4697
TURCK BL20 Programmable Gateway and BL67 Programmable Gateway have hardcoded accounts, which allows remote malicious users to obtain administrative access via an FTP session.
Turck Bl67 Programmable Gateway Firmware -
Turck Bl20 Programmable Gateway -
Turck Bl20 Programmable Gateway Firmware -
Turck Bl67 Programmable Gateway -
NA
CVE-2004-1754
The DNS proxy (DNSd) for multiple Symantec Gateway Security products allows remote malicious users to poison the DNS cache via a malicious DNS server query response that contains authoritative or additional records.
Symantec Enterprise Firewall 8.0
Symantec Enterprise Firewall 7.0.4
Symantec Gateway Security 5200 1.0
Symantec Gateway Security 5310 1.0
Symantec Gateway Security 5400 2.0.1
Symantec Gateway Security 5110 1.0
Symantec Gateway Security 5300 1.0
Symantec Gateway Security 5400 2.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »