Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Symantec_proxysg
(Broadcom)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 13 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-06-30 | CVE-2021-30648 | The Symantec Advanced Secure Gateway (ASG) and ProxySG web management consoles are susceptible to an authentication bypass vulnerability. An unauthenticated attacker can execute arbitrary CLI commands, view/modify the appliance configuration and policy, and shutdown/restart the appliance. | Symantec_advanced_secure_gateway_500\-10_firmware, Symantec_advanced_secure_gateway_s200\-30_firmware, Symantec_advanced_secure_gateway_s200\-40_firmware, Symantec_advanced_secure_gateway_s400\-20_firmware, Symantec_advanced_secure_gateway_s400\-30_firmware, Symantec_advanced_secure_gateway_s400\-40_firmware, Symantec_advanced_secure_gateway_s500\-20_firmware, Symantec_proxysg | 9.8 | ||
2017-05-11 | CVE-2016-9097 | The Symantec Advanced Secure Gateway (ASG) 6.6 prior to 6.6.5.8, ProxySG 6.5 prior 6.5.10.6, ProxySG 6.6 prior to 6.6.5.8, and ProxySG 6.7 prior to 6.7.1.2 management consoles do not, under certain circumstances, correctly authorize administrator users. A malicious administrator with read-only access can exploit this vulnerability to access management console functionality that requires read-write access privileges. | Advanced_secure_gateway, Symantec_proxysg | 7.2 | ||
2017-05-11 | CVE-2016-9099 | Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 prior to 6.7.2.1, ProxySG 6.5 prior to 6.5.10.6, ProxySG 6.6, and ProxySG 6.7 prior to 6.7.2.1 are susceptible to an open redirection vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to redirect the target user to a malicious web site. | Advanced_secure_gateway, Symantec_proxysg | 6.1 |