Page 7 of 49 results (0.010 seconds)

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 enables weak SSL ciphers in conf/server.xml, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data. La configuración por defecto de Apache Tomcat en Websense Manager en Websense Web Security v7.0 y Web Filter v7.0 permite cifrado débil SSL en conf/server.xml, lo que hace facilita a los atacantes remotos obtener información sensible espiando la red y realizando un ataque de fuerza bruta sobre los datos de sesión cifrados. • http://www.websense.com/support/article/t-kbarticle/v7-Apache-Tomcat-security-vulnerabilities-1258048503850 • CWE-16: Configuration •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Websense Email Security 7.1 before Hotfix 4 allows remote attackers to bypass the sender-based blacklist by using the 8BITMIME EHLO keyword in the SMTP session. Websense Email Security anterior a v7.1 Hotfix 4 permite a atacantes remotos evitar la lista negra de remitentes utilizando la palabra clave 8BITMIME EHLO en la sesión SMTP. • http://www.websense.com/support/article/t-kbarticle/Hotfix-4-for-Websense-Email-Security-v7-1 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

The Personal Email Manager component in Websense Email Security before 7.2 allows remote attackers to obtain potentially sensitive information from the JBoss status page via an unspecified query. El componente Personal Email Manager en Websense Email Security anterior a v7.2 permite a atacantes remotos obtener información sensible de la página de estado de JBoss a través de una consulta sin especificar. • http://www.websense.com/content/support/library/email/v72wes/release_notes/WES72_ReleaseNotes.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/78449 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

The Remote Filtering component in Websense Web Security and Web Filter before 6.3.3 Hotfix 18 and 7.x before 7.1.1 allows remote attackers to cause a denial of service (daemon exit) via a large volume of traffic. El componente Remote Filtering en Websense Web Security y Web Filter v6.3.3 anterior a Hotfix 18 y v7.x anterior a v7.1.1 permite a atacantes remotos provocar una denegación de servicio (salida del demonio) a través de un gran volumen de tráfico. • http://www.websense.com/content/support/library/web/v711/ws711_known_issues/first.aspx http://www.websense.com/content/support/library/web/v711/ws711_known_issues/ws711_known_issues.pdf •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

The Filtering Service in Websense Enterprise 5.2 through 6.3 does not consider the IP address during URL categorization, which makes it easier for remote attackers to bypass filtering via an HTTP request, as demonstrated by a request to a compromised server associated with a specific IP address. Filtering Service de Websense Enterprise v5.2 hasta 6.3 no considera la dirección IP durante la categorización de las URL, lo que facilita a los atacantes remotos evitar la filtración a través de una petición HTTP, como se demuestra por una solicitud a un servidor comprometido asociado con una dirección IP específica. • http://www.websense.com/support/article/t-kbarticle/Why-doesn-t-my-Websense-installation-categorize-URLs-and-Permit-Block-in-accordance-with-the-Site-Lookup-Tool-s-categorization https://exchange.xforce.ibmcloud.com/vulnerabilities/78299 • CWE-20: Improper Input Validation •