Kaspersky ID:
KLA10506
Detect Date:
03/25/2015
Updated:
09/26/2023

Description

Multiple serious vulnerabilities have been found in Websense products. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, execute or inject arbitrary code, spoof user interface and read or write arbitrary files.

Below is a complete list of vulnerabilities

  1. Multiple XSS vulnerabilities can be exploited remotely via parameters manipulation, a specially designed request and an unknown vectors related to DSS Mobile or DLP report;
  2. Lack of access restrictions can be exploited remotely via direct request;
  3. An unknown vulnerability can be exploited remotely via parameters manipulation and vectors related to SVM, brute force and Autocomplete;
  4. Improper credentials storage can be exploited remotely via a specially designed path and other unknown vendors;
  5. Multiple CSRF vulnerabilities can be exploited remotely via an unknown vectors.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

CVE list

  • CVE-2015-2747
    warning
  • CVE-2015-2746
    high
  • CVE-2014-9711
    warning
  • CVE-2015-2748
    critical
  • CVE-2015-2703
    warning
  • CVE-2015-2702
    warning
  • CVE-2015-2761
    warning
  • CVE-2015-2762
    critical
  • CVE-2014-9712
    warning
  • CVE-2015-2763
    critical
  • CVE-2015-2764
    warning
  • CVE-2015-2773
    critical
  • CVE-2015-2767
    critical
  • CVE-2015-2768
    warning
  • CVE-2015-2765
    warning
  • CVE-2015-2766
    critical
  • CVE-2015-2771
    critical
  • CVE-2015-2772
    critical
  • CVE-2015-2769
    high
  • CVE-2015-2770
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.