语言:
http://www.nessus.org/u?97079438
https://www.securityfocus.com/archive/1/524191/30/0/threaded
https://www.securityfocus.com/archive/1/524192/30/0/threaded
https://www.securityfocus.com/archive/1/524193/30/0/threaded
https://www.securityfocus.com/archive/1/524876/30/0/threaded
https://www.securityfocus.com/archive/1/524877/30/0/threaded
https://www.securityfocus.com/archive/1/524878/30/0/threaded
https://www.securityfocus.com/archive/1/524879/30/0/threaded
严重性: High
ID: 62010
文件名: symantec_messaging_gateway_sym12-013.nasl
版本: 1.21
类型: remote
系列: CGI abuses
发布时间: 2012/9/7
最近更新时间: 2021/1/19
支持的传感器: Nessus
风险因素: High
分数: 7.4
风险因素: High
基本分数: 7.9
时间分数: 6.5
矢量: CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2012-3579
CPE: cpe:/a:symantec:messaging_gateway
必需的 KB 项: www/sym_msg_gateway
可利用: true
易利用性: No exploit is required
补丁发布日期: 2012/8/27
漏洞发布日期: 2012/8/27
Core Impact
Metasploit (Symantec Messaging Gateway 9.5 Default SSH Password Vulnerability)
Elliot (Symantec Messaging Gateway 9.5.3 File Disclosure)
CVE: CVE-2012-0307, CVE-2012-0308, CVE-2012-3579, CVE-2012-3580, CVE-2012-3581, CVE-2012-4347