6.5
CVSSv2

CVE-2014-7285

Published: 17/12/2014 Updated: 03/01/2017
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 656
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The management console on the Symantec Web Gateway (SWG) appliance prior to 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

symantec web gateway

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info={}) super(update_info(info, 'Name' ...
Symantec Web Gateway versions 521 and below suffer from a remote OS command injection vulnerability ...

Github Repositories

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports

VIEM VIEM (short for Vulnerability Information Extraction Model) is a tool used for automatically extracting vulnerable software names and versions from unstructured reports It combines a Named Entity Recognition (NER) model and a Relation Extraction (RE) model The goal is to enable the possibility to continuously monitor different vulnerability reporting websites and periodi

try tool

VIEM VIEM (short for Vulnerability Information Extraction Model) is a tool used for automatically extracting vulnerable software names and versions from unstructured reports It combines a Named Entity Recognition (NER) model and a Relation Extraction (RE) model The goal is to enable the possibility to continuously monitor different vulnerability reporting websites and periodi