CVE-2009-3749 – Websense Email Security - Denial of Service
https://notcve.org/view.php?id=CVE-2009-3749
The Web Administrator service (STEMWADM.EXE) in Websense Personal Email Manager 7.1 before Hotfix 4 and Email Security 7.1 before Hotfix 4 allows remote attackers to cause a denial of service (crash) by sending a HTTP GET request to TCP port 8181 and closing the socket before the service can send a response. El Web Administrator service (STEMWADM.EXE) en Websense Personal Email Manager v7.1 anterior Hotfix v4 y Email Security v7.1 anterior Hotfix v4 permite a atacantes remotos causar una denegación de servicio (caída) enviando una petición HTTP GET en el puerto TCP 8181 y cerrando el socket antes de que el servicio pueda enviar la respuesta. • https://www.exploit-db.com/exploits/9980 http://kb.websense.com/article.aspx?article=4786&p=12 http://kb.websense.com/display/4/kb/article.aspx?aid=4786 http://secunia.com/advisories/37091 http://sotiriu.de/adv/NSOADV-2009-002.txt http://www.securityfocus.com/archive/1/507329/100/0/threaded http://www.securityfocus.com/bid/36740 http://www.vupen.com/english/advisories/2009/2987 •
CVE-2009-3748 – Websense Email Security - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2009-3748
Multiple cross-site scripting (XSS) vulnerabilities in the Web Administrator in Websense Personal Email Manager 7.1 before Hotfix 4 and Email Security 7.1 before Hotfix 4 allow remote attackers to inject arbitrary web script or HTML via the (1) FileName, (2) IsolatedMessageID, (3) ServerName, (4) Dictionary, (5) Scoring, and (6) MessagePart parameters to web/msgList/viewmsg/actions/msgAnalyse.asp; the (7) Queue, (8) FileName, (9) IsolatedMessageID, and (10) ServerName parameters to actions/msgForwardToRiskFilter.asp and viewHeaders.asp in web/msgList/viewmsg/; and (11) the subject in an e-mail message that is held in a Queue. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Web Administrator en Websense Personal Email Manager v7.1 anteriores a Hotfix v4 y Email Security v7.1 anteriores a Hotfix v4 permite a los atacantes remotos inyectar arbitrariamente una secuencia de comandos web o HTML a través de los parámetros (1) FileName, (2) IsolatedMessageID, (3) ServerName, (4) Dictionary, (5) Scoring, y (6) MessagePart parameters to web/msgList/viewmsg/actions/msgAnalyse.asp; the (7) Queue, (8) FileName, (9) IsolatedMessageID, and (10) ServerName para actions/msgForwardToRiskFilter.asp y viewHeaders.asp en web/msgList/viewmsg/; y (11) el asunto en un mensaje de correo electrónico que se mantiene en una Queue. • https://www.exploit-db.com/exploits/9981 http://kb.websense.com/display/4/kb/article.aspx?aid=4786 http://secunia.com/advisories/37091 http://sotiriu.de/adv/NSOADV-2009-003.txt http://www.securityfocus.com/archive/1/507330/100/0/threaded http://www.securityfocus.com/bid/36741 http://www.vupen.com/english/advisories/2009/2987 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •