Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
websense websense vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2009-5119
The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 enables weak SSL ciphers in conf/server.xml, which makes it easier for remote malicious users to obtain sensitive information by sniffing the network and then conducting...
Websense Websense Web Filter 7.0
Websense Websense Web Security 7.0
383
VMScore
CVE-2009-5120
The default configuration of Apache Tomcat in Websense Manager in Websense Web Security 7.0 and Web Filter 7.0 allows connections to TCP port 1812 from arbitrary source IP addresses, which makes it easier for remote malicious users to conduct cross-site scripting (XSS) attacks vi...
Websense Websense Web Security 7.0
Websense Websense Web Filter 7.0
445
VMScore
CVE-2009-5122
The Personal Email Manager component in Websense Email Security prior to 7.2 allows remote malicious users to obtain potentially sensitive information from the JBoss status page via an unspecified query.
Websense Websense Email Security
Websense Websense Email Security 7.0
Websense Websense Email Security 6.1
383
VMScore
CVE-2012-4604
The TRITON management console in Websense Web Security prior to 7.6 Hotfix 24 allows remote malicious users to bypass authentication and read arbitrary reports via a crafted uid field, in conjunction with a crafted userRoles field, in a cookie, as demonstrated by a request to exp...
Websense Websense Web Security 7.5
Websense Websense Web Security 7.1
Websense Websense Web Security
Websense Websense Web Security 6.3.3
Websense Websense Web Security 6.3.2
Websense Websense Web Security 6.3.1
Websense Websense Web Security 6.3.0
Websense Websense Web Security 7.5.1
Websense Websense Web Security 7.1.1
Websense Websense Web Security 7.0
445
VMScore
CVE-2008-7312
The Filtering Service in Websense Enterprise 5.2 up to and including 6.3 does not consider the IP address during URL categorization, which makes it easier for remote malicious users to bypass filtering via an HTTP request, as demonstrated by a request to a compromised server asso...
Websense Enterprise 5.5
Websense Enterprise 6.1
Websense Enterprise 6.2
Websense Enterprise 6.3
Websense Enterprise 5.2
668
VMScore
CVE-2011-5102
The Investigative Reports web interface in the TRITON management console in Websense Web Security 7.1 before Hotfix 109, 7.1.1 before Hotfix 06, 7.5 before Hotfix 78, 7.5.1 before Hotfix 12, 7.6 before Hotfix 24, and 7.6.2 before Hotfix 12; Web Filter; Web Security Gateway; and W...
Websense Websense Web Security 7.1
Websense Websense Web Security 7.5
Websense Websense Web Security Gateway
Websense Websense Web Security 7.5.1
Websense Websense Web Security 7.6
Websense Websense Web Security 7.6.2
Websense Websense Web Filter
Websense Websense Web Security 7.1.1
Websense Websense Web Security Gateway Anywhere
445
VMScore
CVE-2012-4605
The default configuration of the SMTP component in Websense Email Security 6.1 up to and including 7.3 enables weak SSL ciphers in the "SurfControl plc\SuperScout Email Filter\SMTP" registry key, which makes it easier for remote malicious users to obtain sensitive infor...
Websense Websense Email Security 7.0
Websense Websense Email Security 7.2
Websense Websense Email Security 7.1
Websense Websense Email Security 6.1
383
VMScore
CVE-2010-5145
The Filtering Service in Websense Web Security and Web Filter prior to 6.3.1 Hotfix 136 and 7.x prior to 7.1.1 on Windows allows remote malicious users to cause a denial of service (filtering outage) via a crafted sequence of characters in a URI.
Websense Websense Web Filter 7.1
Websense Websense Web Security 7.1
Websense Websense Web Filter
Websense Websense Web Filter 7.0
Websense Websense Web Security
Websense Websense Web Security 7.0
445
VMScore
CVE-2010-5148
Websense Web Security and Web Filter prior to 7.1 Hotfix 21 do not set the secure flag for the Encrypted Session (SSL) cookie in an https session, which makes it easier for remote malicious users to capture this cookie by intercepting its transmission within an http session.
Websense Websense Web Security
Websense Websense Web Filter
383
VMScore
CVE-2010-5144
The ISAPI Filter plug-in in Websense Enterprise, Websense Web Security, and Websense Web Filter 6.3.3 and previous versions, when used in conjunction with a Microsoft ISA or Microsoft Forefront TMG server, allows remote malicious users to bypass intended filtering and monitoring ...
Websense Websense 6.3.1
Websense Websense
Websense Websense 6.3.0
Websense Websense Web Security 6.3.3
Websense Websense Web Security 6.3.1
Websense Websense Web Security 6.3.0
Websense Websense Web Filter
Websense Websense Web Filter 6.3.0
Websense Websense Web Filter 6.3.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »