3 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Blue Coat Advanced Secure Gateway 6.6, CacheFlow 3.4, ProxySG 6.5 and 6.6 allows remote attackers to bypass blocked requests, user authentication, and payload scanning. Blue Coat Advanced Secure Gateway 6.6, CacheFlow 3.4, ProxySG versiones 6.5 y 6.6 permite a los atacantes remotos evitar las solicitudes bloqueadas, la autenticación del usuario y el escaneo de la carga útil. • http://www.securityfocus.com/bid/91404 https://bto.bluecoat.com/security-advisory/sa130 • CWE-254: 7PK - Security Features •

CVSS: 9.0EPSS: 1%CPEs: 2EXPL: 2

Blue Coat Advanced Secure Gateway (ASG) 6.6 before 6.6.5.4 and Content Analysis System (CAS) 1.3 before 1.3.7.4 are susceptible to an OS command injection vulnerability. An authenticated malicious administrator can execute arbitrary OS commands with elevated system privileges. Blue Coat Advanced Security Gateway (ASG) 6.6 en versiones anteriores a 6.6.5.4 y el Sistema de Análisis de Contenido (CAS) 1.3 en versiones anteriores a 1.3.7.4 son susceptibles a una vulnerabilidad de inyección de comandos de OS. Un administrador malicioso autenticado puede ejecutar comandos de OS arbitrarios con privilegios de sistema elevados. • https://www.exploit-db.com/exploits/41786 https://www.exploit-db.com/exploits/41785 http://www.securityfocus.com/bid/97372 https://bto.bluecoat.com/security-advisory/sa138 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.4EPSS: 0%CPEs: 2EXPL: 1

Open redirect vulnerability in Blue Coat ProxySG 6.5 before 6.5.8.8 and 6.6 and Advanced Secure Gateway (ASG) 6.6 might allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a base64-encoded URL in conjunction with a "clear text" one in a coaching page, as demonstrated by "http://www.%humbug-URL%.local/bluecoat-splash-API?%BASE64-URL%." Vulnerabilidad de redirección abierta en Blue Coat ProxySG 6.5 en versiones anteriores a 6.5.8.8 y 6.6 y Advanced Secure Gateway (ASG) 6.6 podría permitir a atacantes remotos redirigir a usuarios a páginas web arbitrarias y dirigir ataques de phishing a través de una URL codificada en base64 en conjunción con un "clear text" en página de entrenamiento, según lo demostrado por "http://www.%humbug-URL%.local/bluecoat-splash-API? • http://knowitsecure.se/2015/12/18/knowit-secure-sakrar-bluecoat http://www.securitytracker.com/id/1034506 https://bto.bluecoat.com/security-advisory/sa107 •