Дата обнаружения
|
25/03/2015 |
Уровень угрозы
|
Critical |
Описание
|
Multiple serious vulnerabilities have been found in Websense products. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, execute or inject arbitrary code, spoof user interface and read or write arbitrary files. Below is a complete list of vulnerabilities
|
Пораженные продукты
|
Websense TRITON AP-WEB versions earlier than 8.0.0 |
Решение
|
Update to the latest version |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
CI
[?]
SB
[?]
WLF
[?]
RLF
[?]
SUI
[?]
|
Связанные продукты
|
Web Security Gateway Anywhere Web Security Gateway Web Security and Filter TRITON AP-DATA TRITON AP-EMAIL TRITON V-Series TRITON AP-WEB |
CVE-IDS
|
CVE-2015-27474.3Warning
CVE-2015-27466.5High CVE-2014-97114.3Warning CVE-2015-27485.0Critical CVE-2015-27034.3Warning CVE-2015-27024.3Warning CVE-2015-27614.3Warning CVE-2015-27625.0Critical CVE-2014-97124.0Warning CVE-2015-27644.3Warning CVE-2015-27735.0Critical CVE-2015-27684.3Warning CVE-2015-27654.3Warning CVE-2015-27665.0Critical CVE-2015-27715.0Critical CVE-2015-27727.5Critical CVE-2015-27696.8High CVE-2015-27706.8High |
Эксплуатация
|
The following public exploits exists for this vulnerability: |
Узнай статистику распространения уязвимостей в твоем регионе |