3.5
CVSSv2

CVE-2014-0347

Published: 12/04/2014 Updated: 14/04/2014
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N

Vulnerability Summary

The Settings module in Websense Triton Unified Security Center 7.7.3 before Hotfix 31, Web Filter 7.7.3 before Hotfix 31, Web Security 7.7.3 before Hotfix 31, Web Security Gateway 7.7.3 before Hotfix 31, and Web Security Gateway Anywhere 7.7.3 before Hotfix 31 allows remote authenticated users to read cleartext passwords by replacing type="password" with type="text" in an INPUT element in the (1) Log Database or (2) User Directories component.

Vulnerable Product Search on Vulmon Subscribe to Product

websense triton web filter 7.7.3

websense triton web security 7.7.3

websense triton web security gateway 7.7.3

websense triton web security gateway anywhere 7.7.3

websense triton unified security center 7.7.3

Github Repositories

Crawl different cve information from https://www.cvedetails.com/. Check the final data in data.csv

Scrapy-CVE_Detail Crawl different cve information from wwwcvedetailscom/ Check the final data in datacsv 1 Prerequisite Python: 36 or above Scrapy 2 Output Example: url: wwwcvedetailscom//cve/CVE-2014-0347/ title: CVE-2014-0347 vendor: Websense said: CVE-2014-0347 publishedDate: 4/12/2014 modifiedDate: 4/14/2014 description:The Settings mo