Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Symantec_messaging_gateway
(Broadcom)Repositories | git://git.openssl.org/openssl.git |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-06-24 | CVE-2021-30651 | A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access. | Symantec_messaging_gateway | 4.9 | ||
2024-01-26 | CVE-2024-23614 | A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root. | Symantec_messaging_gateway | 9.8 | ||
2024-01-26 | CVE-2024-23615 | A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root. | Symantec_messaging_gateway | 9.8 | ||
2020-12-10 | CVE-2020-12594 | A privilege escalation flaw allows a malicious, authenticated, privileged CLI user to escalate their privileges on the system and gain full control over the SMG appliance. This affects SMG prior to 10.7.4. | Symantec_messaging_gateway | 7.2 | ||
2020-12-10 | CVE-2020-12595 | An information disclosure flaw allows a malicious, authenticated, privileged web UI user to obtain a password for a remote SCP backup server that they might not otherwise be authorized to access. This affects SMG prior to 10.7.4. | Symantec_messaging_gateway | 4.9 |