Vulnerabilities > Websense
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2012-08-23 | CVE-2009-5120 | Configuration vulnerability in Websense web Filter and Websense web Security The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 allows connections to TCP port 1812 from arbitrary source IP addresses, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via UTF-7 text to the 404 error page of a Project Woodstock service on this port. | 4.3 |
2012-08-23 | CVE-2009-5119 | Configuration vulnerability in Websense web Filter and Websense web Security The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 enables weak SSL ciphers in conf/server.xml, which makes it easier for remote attackers to obtain sensitive information by sniffing the network and then conducting a brute-force attack against encrypted session data. | 4.3 |
2012-08-23 | CVE-2008-7312 | Improper Input Validation vulnerability in Websense Enterprise The Filtering Service in Websense Enterprise 5.2 through 6.3 does not consider the IP address during URL categorization, which makes it easier for remote attackers to bypass filtering via an HTTP request, as demonstrated by a request to a compromised server associated with a specific IP address. | 5.0 |
2009-10-22 | CVE-2009-3749 | Remote Denial of Service vulnerability in Websense Email Security and Personal Email Manager The Web Administrator service (STEMWADM.EXE) in Websense Personal Email Manager 7.1 before Hotfix 4 and Email Security 7.1 before Hotfix 4 allows remote attackers to cause a denial of service (crash) by sending a HTTP GET request to TCP port 8181 and closing the socket before the service can send a response. | 5.0 |
2009-10-22 | CVE-2009-3748 | Cross-Site Scripting vulnerability in Websense Personal Email Manager and Websense Email Security Multiple cross-site scripting (XSS) vulnerabilities in the Web Administrator in Websense Personal Email Manager 7.1 before Hotfix 4 and Email Security 7.1 before Hotfix 4 allow remote attackers to inject arbitrary web script or HTML via the (1) FileName, (2) IsolatedMessageID, (3) ServerName, (4) Dictionary, (5) Scoring, and (6) MessagePart parameters to web/msgList/viewmsg/actions/msgAnalyse.asp; the (7) Queue, (8) FileName, (9) IsolatedMessageID, and (10) ServerName parameters to actions/msgForwardToRiskFilter.asp and viewHeaders.asp in web/msgList/viewmsg/; and (11) the subject in an e-mail message that is held in a Queue. | 4.3 |
2008-10-22 | CVE-2008-4646 | Credentials Management vulnerability in Websense Enterpise 6.3.2 The Websense Reporter Module in Websense Enterprise 6.3.2 stores the SQL database system administrator password in plaintext in CreateDbInstall.log, which allows local users to gain privileges to the database. | 2.1 |
2007-12-21 | CVE-2007-6511 | Security Bypass vulnerability in Websense Enterpise 6.3.1 Websense Enterprise 6.3.1 allows remote attackers to bypass content filtering by visiting http URLs with a (1) RealPlayer G2, (2) MSMSGS, or (3) StoneHttpAgent User-Agent header, which results in a Non-HTTP categorization. | 5.0 |
2007-12-11 | CVE-2007-6312 | Cross-Site Scripting vulnerability in Websense Enterpise, Reporting Tools and web Security Suite Cross-site scripting (XSS) vulnerability in the logon page in Web Reporting Tools portal in Websense Enterprise and Web Security Suite 6.3 allows remote attackers to inject arbitrary web script or HTML via the username field. | 4.3 |
2006-04-26 | CVE-2006-2035 | Local Security vulnerability in Websense Websense, when configured to permit access to the dynamic content category, allows local users to bypass intended blocking of the Uncategorized category by appending a "/?" sequence to a URL. | 3.7 |