[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7E45577E4E72EC42BB3F8560D57E755145A31916@manexchprd01>
Date: Thu, 15 Dec 2011 09:05:29 +0000
From: "Research@...Secure" <research@...secure.com>
To: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Subject: NGS00137 Patch Notification: Websense Triton 7.6 - Reflected XSS
in report management UI
Medium Risk Vulnerability in Websense Triton
15 December 2011
Ben Williams of NGS Secure has discovered a Medium risk vulnerability in Websense
Impact: Reflected XSS
Versions affected include:
Websense Web Security Gateway Anywhere v7.6
Websense Web Security Gateway v7.6
Websense Web Security v7.6
Websense Web Filter v7.6
Windows and Linux
v7.6 prior to Hotfix 24
This issue is addressed in Hotfix 24, which can be downloaded at:
https://www.websense.com/content/mywebsense-hotfixes.aspx
NGS Secure is going to withhold details of this flaw for three months. This three month window will allow users the time needed to apply the patch before the details are released to the general public. This reflects the NGS Secure approach to responsible disclosure.
NGS Secure Research
http://www.ngssecure.com
Powered by blists - more mailing lists