9 results (0.008 seconds)

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

The Filtering Service in Websense Web Security and Web Filter before 6.3.1 Hotfix 106 and 7.x before 7.1 allow remote attackers to cause a denial of service (filtering outage) via a crafted URL. El servicio de filtrado en Websense Web Security y Web Filter anterior a v6.3.1 Hotfix 106 y v7.x anterior a v7.1 permite a atacantes remotos causar una denegación de servicio (filtering outage) a través de una URL manipulada. • http://www.websense.com/content/support/library/web/v71/wws_pdfs/ws_releasenotes.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/78570 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 enables weak SSL ciphers in conf/server.xml, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data. La configuración por defecto de Apache Tomcat en Websense Manager en Websense Web Security v7.0 y Web Filter v7.0 permite cifrado débil SSL en conf/server.xml, lo que hace facilita a los atacantes remotos obtener información sensible espiando la red y realizando un ataque de fuerza bruta sobre los datos de sesión cifrados. • http://www.websense.com/support/article/t-kbarticle/v7-Apache-Tomcat-security-vulnerabilities-1258048503850 • CWE-16: Configuration •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

The Remote Filtering component in Websense Web Security and Web Filter before 6.3.3 Hotfix 18 and 7.x before 7.1.1 allows remote attackers to cause a denial of service (daemon exit) via a large volume of traffic. El componente Remote Filtering en Websense Web Security y Web Filter v6.3.3 anterior a Hotfix 18 y v7.x anterior a v7.1.1 permite a atacantes remotos provocar una denegación de servicio (salida del demonio) a través de un gran volumen de tráfico. • http://www.websense.com/content/support/library/web/v711/ws711_known_issues/first.aspx http://www.websense.com/content/support/library/web/v711/ws711_known_issues/ws711_known_issues.pdf •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

Websense Web Security and Web Filter before 6.3.3 Hotfix 27 and 7.x before 7.1.1 allow remote attackers to cause a denial of service (Blue Coat appliance integration outage) via a long URL. Websense Web Security y Web Filter anterior a v6.3.3 Hotfix 27 y v7.x anterior a v7.1.1 permite a atacantes remotos causar una denegación de servicio (Blue Coat appliance integration outage) a través de una URL larga. • http://www.websense.com/content/support/library/web/v711/ws711_known_issues/first.aspx http://www.websense.com/content/support/library/web/v711/ws711_known_issues/ws711_known_issues.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/78341 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Websense Web Security and Web Filter before 7.1 Hotfix 21 do not set the secure flag for the Encrypted Session (SSL) cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. Websense Web Security y Web Filter anteriores a v7.1 Hotfix 21 no fija el "flag" secure para la cookie de sesión Encrypted Session (SSL) en una sesión https, lo que facilita a atacantes remotos la captura de esta cookie interceptándola cuando se transmite dentro de una sesión http. • http://www.websense.com/content/support/library/web/v711/ws711_known_issues/first.aspx http://www.websense.com/content/support/library/web/v711/ws711_known_issues/ws711_known_issues.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/78342 •