CVE-2012-2953 – Symantec Web Gateway 5.0.2.18 - 'pbcontrol.php' Command Injection
https://notcve.org/view.php?id=CVE-2012-2953
The management console in Symantec Web Gateway 5.0.x before 5.0.3.18 allows remote attackers to execute arbitrary commands via crafted input to application scripts. La consola de gestión en Symantec Web Gateway v5.0.x anteriores a v5.0.3.18 permite a atacantes remotos ejecutar comandos a través de una entrada manipulada a una secuencia de comandos de aplicación. • https://www.exploit-db.com/exploits/20113 https://www.exploit-db.com/exploits/20088 http://www.kb.cert.org/vuls/id/108471 http://www.securityfocus.com/bid/54426 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2012-2957 – Symantec Web Gateway 5.0.3.18 - Local/Remote File Inclusion / Remote Command Execution
https://notcve.org/view.php?id=CVE-2012-2957
The management console in Symantec Web Gateway 5.0.x before 5.0.3.18 allows local users to gain privileges by modifying files, related to a "file inclusion" issue. La consola de gestión en Symantec Web Gateway v5.0.x anterior a v5.0.3.18 permite a usuarios locales obtener privilegios modificando ficheros, relacionado con inclusión de ficheros (file inclusión). • https://www.exploit-db.com/exploits/20064 http://www.kb.cert.org/vuls/id/108471 http://www.securityfocus.com/bid/54429 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00 https://exchange.xforce.ibmcloud.com/vulnerabilities/77113 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-2977 – Symantec Web Gateway 5.0.3.18 - Arbitrary Password Change
https://notcve.org/view.php?id=CVE-2012-2977
The management console in Symantec Web Gateway 5.0.x before 5.0.3.18 allows remote attackers to change arbitrary passwords via crafted input to an application script. La consola de gestión en Symantec Web Gateway v5.0.x anteriores a v5.0.3.18 permite a atacantes remotos a cambiar contraseñas a través de una entrada manipulada sobre una secuencia de comandos (script) de aplicación. • https://www.exploit-db.com/exploits/20707 https://www.exploit-db.com/exploits/20706 http://www.kb.cert.org/vuls/id/108471 http://www.securityfocus.com/bid/54430 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-2961 – Symantec Web Gateway 5.0.3.18 - Blind SQL Injection Backdoor via MySQL Triggers
https://notcve.org/view.php?id=CVE-2012-2961
SQL injection vulnerability in the management console in Symantec Web Gateway 5.0.x before 5.0.3.18 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Vulnerabilidad de inyección SQL en la consola de gestión en Symantec Web Gateway v5.0.x anteriores a v5.0.3.18, permite a atacantes remotos ejecutar comandos SQL de su elección a través de vectores no especificados. Symantec Web Gateway version 5.0.3.18 suffers from a remote blind SQL injection backdoor via MySQL triggers. • https://www.exploit-db.com/exploits/20044 http://www.kb.cert.org/vuls/id/108471 http://www.securityfocus.com/bid/54425 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120720_00 https://exchange.xforce.ibmcloud.com/vulnerabilities/77116 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2012-0297 – Symantec Web Gateway Shell Command Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2012-0297
The management GUI in Symantec Web Gateway 5.0.x before 5.0.3 does not properly restrict access to application scripts, which allows remote attackers to execute arbitrary code by (1) injecting crafted data or (2) including crafted data. La interfaz de gestión en Symantec Web Gateway v5.0.x anteriores a v5.0.3 no restringe adecuadamente el acceso a los scripts de aplicaciones, lo que permite a atacantes remotos ejecutar código de su elección mediante (1) inyección de datos manipulados o (2) inclusión de datos manipulados. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Web Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists due to insufficiently filtered user-supplied data used in a call to exec() in multiple script pages. The affected scripts are located in '/spywall/ipchange.php' and 'network.php'. • https://www.exploit-db.com/exploits/18942 https://www.exploit-db.com/exploits/19406 https://www.exploit-db.com/exploits/18932 https://www.exploit-db.com/exploits/19065 http://www.securityfocus.com/bid/53444 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120517_00 https://exchange.xforce.ibmcloud.com/vulnerabilities/75731 https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/s • CWE-264: Permissions, Privileges, and Access Controls •