Page 3 of 19 results (0.008 seconds)

CVSS: 4.8EPSS: 0%CPEs: 7EXPL: 0

Stored XSS vulnerability in the Symantec Advanced Secure Gateway (ASG) and ProxySG management consoles. A malicious appliance administrator can inject arbitrary JavaScript code in the management console web client application. Vulnerabilidad de Cross-Site Scripting (XSS) persistente en las consolas de gestión Symantec Advanced Secure Gateway (ASG) y ProxySG. Un administrador de aparatos malicioso puede inyectar código JavaScript arbitrario en la aplicación cliente de la consola de gestión web. • http://www.securityfocus.com/bid/103685 http://www.securitytracker.com/id/1040757 https://www.symantec.com/security-center/network-protection-security-advisories/SA162 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

Denial-of-service (DoS) vulnerability in the Symantec Advanced Secure Gateway (ASG) and ProxySG management consoles. A remote attacker can use crafted HTTP/HTTPS requests to cause denial-of-service through management console application crashes. Vulnerabilidad de denegación de servicio (DoS) en las consolas de gestión Symantec Advanced Secure Gateway (ASG) y ProxySG. Un atacante remoto puede emplear peticiones HTTP/HTTPS manipuladas para provocar el cierre inesperado de la aplicación a través de una denegación de servicio (DoS) en la consola de gestión. • http://www.securityfocus.com/bid/103685 http://www.securitytracker.com/id/1040757 https://www.symantec.com/security-center/network-protection-security-advisories/SA162 •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 0

The Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 (prior to 6.7.2.1), ProxySG 6.5 (prior to 6.5.10.6), ProxySG 6.6, and ProxySG 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10256. La consola de gestión de Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 (en versiones anteriores a la 6.7.2.1), ProxySG 6.5 (en versiones anteriores a la 6.5.10.6), ProxySG 6.6 and ProxySG 6.7 (en versiones anteriores a la 6.7.2.1) es susceptible de contener una vulnerabilidad de XSS reflejado. Un atacante remoto puede emplear una URL de la consola de gestión manipulada en un ataque de phishing para inyectar código JavaScript arbitrario en la aplicación del cliente web de la consola de gestión. • http://www.securityfocus.com/bid/102447 http://www.securitytracker.com/id/1040138 https://www.symantec.com/security-center/network-protection-security-advisories/SA155 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Blue Coat Advanced Secure Gateway 6.6, CacheFlow 3.4, ProxySG 6.5 and 6.6 allows remote attackers to bypass blocked requests, user authentication, and payload scanning. Blue Coat Advanced Secure Gateway 6.6, CacheFlow 3.4, ProxySG versiones 6.5 y 6.6 permite a los atacantes remotos evitar las solicitudes bloqueadas, la autenticación del usuario y el escaneo de la carga útil. • http://www.securityfocus.com/bid/91404 https://bto.bluecoat.com/security-advisory/sa130 • CWE-254: 7PK - Security Features •

CVSS: 8.0EPSS: 0%CPEs: 29EXPL: 0

The Symantec Advanced Secure Gateway (ASG) 6.6 prior to 6.6.5.8, ProxySG 6.5 prior 6.5.10.6, ProxySG 6.6 prior to 6.6.5.8, and ProxySG 6.7 prior to 6.7.1.2 management consoles do not, under certain circumstances, correctly authorize administrator users. A malicious administrator with read-only access can exploit this vulnerability to access management console functionality that requires read-write access privileges. Las consolas de administración Advanced Secure Gateway (ASG) versiones 6.6 anteriores a 6.6.5.8, ProxySG versiones 6.5 anteriores a 6.5.10.6, ProxySG versiones 6.6 anteriores a 6.6.5.8 y ProxySG versiones 6.7 anteriores a 6.7.1.2 de Symantec, no autorizan correctamente, bajo determinadas circunstancias, a usuarios administradores. Un administrador malicioso con acceso de solo lectura puede explotar esta vulnerabilidad para acceder a la funcionalidad de consola de administración que requiere privilegios de acceso de lectura y escritura. • http://www.securityfocus.com/bid/101530 http://www.securitytracker.com/id/1039701 https://www.symantec.com/security-center/network-protection-security-advisories/SA146 • CWE-264: Permissions, Privileges, and Access Controls •