Show filters
350 Total Results
Displaying 161-170 of 350
Sort by:
Attacker Value
Unknown

CVE-2019-13163

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
The Fujitsu TLS library allows a man-in-the-middle attack. This affects Interstage Application Development Cycle Manager V10 and other versions, Interstage Application Server V12 and other versions, Interstage Business Application Manager V2 and other versions, Interstage Information Integrator V11 and other versions, Interstage Job Workload Server V8, Interstage List Works V10 and other versions, Interstage Studio V12 and other versions, Interstage Web Server Express V11, Linkexpress V5, Safeauthor V3, ServerView Resource Orchestrator V3, Systemwalker Cloud Business Service Management V1, Systemwalker Desktop Keeper V15, Systemwalker Desktop Patrol V15, Systemwalker IT Change Manager V14, Systemwalker Operation Manager V16 and other versions, Systemwalker Runbook Automation V15 and other versions, Systemwalker Security Control V1, and Systemwalker Software Configuration Manager V15.
Attacker Value
Unknown

CVE-2019-6146

Disclosure Date: January 22, 2020 (last updated February 21, 2025)
It has been reported that cross-site scripting (XSS) is possible in Forcepoint Web Security, version 8.x, via host header injection. CVSSv3.0: 5.3 (Medium) (/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Attacker Value
Unknown

CVE-2020-3117

Disclosure Date: January 22, 2020 (last updated February 22, 2025)
A vulnerability in the API Framework of Cisco AsyncOS for Cisco Web Security Appliance (WSA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to inject crafted HTTP headers in the web server's response. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL and receive a malicious HTTP response. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to a user's browser.
Attacker Value
Unknown

CVE-2012-1316

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
Cisco IronPort Web Security Appliance does not check for certificate revocation which could lead to MITM attacks
Attacker Value
Unknown

CVE-2012-1326

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
Cisco IronPort Web Security Appliance up to and including 7.5 does not validate the basic constraints of the certificate authority which could lead to MITM attacks
Attacker Value
Unknown

CVE-2012-0334

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
Cisco IronPort Web Security Appliance AsyncOS software prior to 7.5 has a SSL Certificate Caching vulnerability which could allow man-in-the-middle attacks
Attacker Value
Unknown

CVE-2019-15956

Disclosure Date: November 07, 2019 (last updated November 27, 2024)
A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations.
Attacker Value
Unknown

CVE-2019-15969

Disclosure Date: November 06, 2019 (last updated February 22, 2025)
A vulnerability in the web-based management interface of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script or HTML code in the context of the interface, which could allow the attacker to gain access to sensitive, browser-based information.
Attacker Value
Unknown

MWG scanners updated to address CVE-2019-9517

Disclosure Date: September 11, 2019 (last updated November 08, 2023)
McAfee Web Gateway (MWG) earlier than 7.8.2.13 is vulnerable to a remote attacker exploiting CVE-2019-9517, potentially leading to a denial of service. This affects the scanning proxies.
Attacker Value
Unknown

MWG scanners updated to address CVE-2019-9511

Disclosure Date: September 11, 2019 (last updated November 08, 2023)
McAfee Web Gateway (MWG) earlier than 7.8.2.13 is vulnerable to a remote attacker exploiting CVE-2019-9511, potentially leading to a denial of service. This affects the scanning proxies.