Show filters
49 Total Results
Displaying 31-40 of 49
Sort by:
Attacker Value
Unknown
CVE-2012-4605
Disclosure Date: August 23, 2012 (last updated October 04, 2023)
The default configuration of the SMTP component in Websense Email Security 6.1 through 7.3 enables weak SSL ciphers in the "SurfControl plc\SuperScout Email Filter\SMTP" registry key, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.
0
Attacker Value
Unknown
CVE-2009-5120
Disclosure Date: August 23, 2012 (last updated October 04, 2023)
The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 allows connections to TCP port 1812 from arbitrary source IP addresses, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via UTF-7 text to the 404 error page of a Project Woodstock service on this port.
0
Attacker Value
Unknown
CVE-2010-5147
Disclosure Date: August 23, 2012 (last updated October 04, 2023)
The Remote Filtering component in Websense Web Security and Web Filter before 6.3.3 Hotfix 18 and 7.x before 7.1.1 allows remote attackers to cause a denial of service (daemon exit) via a large volume of traffic.
0
Attacker Value
Unknown
CVE-2010-5149
Disclosure Date: August 23, 2012 (last updated October 04, 2023)
Websense Web Security and Web Filter before 6.3.3 Hotfix 27 and 7.x before 7.1.1 allow remote attackers to cause a denial of service (Blue Coat appliance integration outage) via a long URL.
0
Attacker Value
Unknown
CVE-2012-4604
Disclosure Date: August 23, 2012 (last updated October 04, 2023)
The TRITON management console in Websense Web Security before 7.6 Hotfix 24 allows remote attackers to bypass authentication and read arbitrary reports via a crafted uid field, in conjunction with a crafted userRoles field, in a cookie, as demonstrated by a request to explorer_wse/favorites.exe.
0
Attacker Value
Unknown
CVE-2010-5148
Disclosure Date: August 23, 2012 (last updated October 04, 2023)
Websense Web Security and Web Filter before 7.1 Hotfix 21 do not set the secure flag for the Encrypted Session (SSL) cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
0
Attacker Value
Unknown
CVE-2009-5119
Disclosure Date: August 23, 2012 (last updated October 04, 2023)
The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 enables weak SSL ciphers in conf/server.xml, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data.
0
Attacker Value
Unknown
CVE-2011-5102
Disclosure Date: August 23, 2012 (last updated October 04, 2023)
The Investigative Reports web interface in the TRITON management console in Websense Web Security 7.1 before Hotfix 109, 7.1.1 before Hotfix 06, 7.5 before Hotfix 78, 7.5.1 before Hotfix 12, 7.6 before Hotfix 24, and 7.6.2 before Hotfix 12; Web Filter; Web Security Gateway; and Web Security Gateway Anywhere allows remote attackers to execute commands via unspecified vectors.
0
Attacker Value
Unknown
CVE-2010-5146
Disclosure Date: August 23, 2012 (last updated October 04, 2023)
The Remote Filtering component in Websense Web Security and Web Filter before 7.1 Hotfix 66 allows local users to bypass filtering by (1) renaming the WDC.exe file or (2) deleting driver files.
0
Attacker Value
Unknown
CVE-2008-7312
Disclosure Date: August 23, 2012 (last updated October 04, 2023)
The Filtering Service in Websense Enterprise 5.2 through 6.3 does not consider the IP address during URL categorization, which makes it easier for remote attackers to bypass filtering via an HTTP request, as demonstrated by a request to a compromised server associated with a specific IP address.
0