11 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

The Filtering Service in Websense Web Security and Web Filter before 6.3.1 Hotfix 106 and 7.x before 7.1 allow remote attackers to cause a denial of service (filtering outage) via a crafted URL. El servicio de filtrado en Websense Web Security y Web Filter anterior a v6.3.1 Hotfix 106 y v7.x anterior a v7.1 permite a atacantes remotos causar una denegación de servicio (filtering outage) a través de una URL manipulada. • http://www.websense.com/content/support/library/web/v71/wws_pdfs/ws_releasenotes.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/78570 •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 2

The ISAPI Filter plug-in in Websense Enterprise, Websense Web Security, and Websense Web Filter 6.3.3 and earlier, when used in conjunction with a Microsoft ISA or Microsoft Forefront TMG server, allows remote attackers to bypass intended filtering and monitoring activities for web traffic via an HTTP Via header. El complemento ISAPI Filter de Websense Enterprise, Websense Web Security y Websense Web Filter v6.3.3 y versiones anteriores, cuando se utiliza junto a Microsoft ISA o con el servidor Microsoft Forefront TMG, permite a atacantes remotos evitar la filtración establecida y monitorizar actividades para el tráfico web a través de la cabecera HTTP. • http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0376.html http://mrhinkydink.blogspot.com/2010/05/websense-633-via-bypass.html http://www.websense.com/support/article/t-kbarticle/Web-Security-Vulnerability-Microsoft-ISA-Server-Integrations • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 enables weak SSL ciphers in conf/server.xml, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data. La configuración por defecto de Apache Tomcat en Websense Manager en Websense Web Security v7.0 y Web Filter v7.0 permite cifrado débil SSL en conf/server.xml, lo que hace facilita a los atacantes remotos obtener información sensible espiando la red y realizando un ataque de fuerza bruta sobre los datos de sesión cifrados. • http://www.websense.com/support/article/t-kbarticle/v7-Apache-Tomcat-security-vulnerabilities-1258048503850 • CWE-16: Configuration •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

The Remote Filtering component in Websense Web Security and Web Filter before 6.3.3 Hotfix 18 and 7.x before 7.1.1 allows remote attackers to cause a denial of service (daemon exit) via a large volume of traffic. El componente Remote Filtering en Websense Web Security y Web Filter v6.3.3 anterior a Hotfix 18 y v7.x anterior a v7.1.1 permite a atacantes remotos provocar una denegación de servicio (salida del demonio) a través de un gran volumen de tráfico. • http://www.websense.com/content/support/library/web/v711/ws711_known_issues/first.aspx http://www.websense.com/content/support/library/web/v711/ws711_known_issues/ws711_known_issues.pdf •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

Websense Web Security and Web Filter before 6.3.3 Hotfix 27 and 7.x before 7.1.1 allow remote attackers to cause a denial of service (Blue Coat appliance integration outage) via a long URL. Websense Web Security y Web Filter anterior a v6.3.3 Hotfix 27 y v7.x anterior a v7.1.1 permite a atacantes remotos causar una denegación de servicio (Blue Coat appliance integration outage) a través de una URL larga. • http://www.websense.com/content/support/library/web/v711/ws711_known_issues/first.aspx http://www.websense.com/content/support/library/web/v711/ws711_known_issues/ws711_known_issues.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/78341 •