ID CVE-2015-2767
Type cve
Reporter NVD
Modified 2016-12-02T22:06:07
Description
Unspecified vulnerability in Websense TRITON AP-EMAIL before 8.0.0 has unknown impact and attack vectors, related to "Autocomplete Enabled."
{"id": "CVE-2015-2767", "bulletinFamily": "NVD", "title": "CVE-2015-2767", "description": "Unspecified vulnerability in Websense TRITON AP-EMAIL before 8.0.0 has unknown impact and attack vectors, related to \"Autocomplete Enabled.\"", "published": "2015-03-27T10:59:15", "modified": "2016-12-02T22:06:07", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2767", "reporter": "NVD", "references": ["http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0", "http://www.securityfocus.com/bid/73418"], "cvelist": ["CVE-2015-2767"], "type": "cve", "lastseen": "2017-04-18T15:56:34", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:websense:triton_ap_email:7.8.3"], "cvelist": ["CVE-2015-2767"], "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "Unspecified vulnerability in Websense TRITON AP-EMAIL before 8.0.0 has unknown impact and attack vectors, related to \"Autocomplete Enabled.\"", "edition": 1, "hash": "1482950b0428e828eb9c6a90c5939c56c2ccf44737e12aeb5f3ee9aa3a5883c9", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "c97dcdf62ee4d4dd6b54c9e666963014", "key": "published"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "e7c769b98e1e30d82d33d68652f66edb", "key": "references"}, {"hash": "354ad3e4c01ff534d38f8468d877cc85", "key": "modified"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "2bdabeb49c44761f9565717ab0e38165", "key": "cvss"}, {"hash": "f7d6568f2420a76fb72c69f5a6275444", "key": "description"}, {"hash": "ac9504194de30a200a8112d121d059d3", "key": "cvelist"}, {"hash": "abfbbeb3ae3cf622f69d9e4850ef8529", "key": "cpe"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "9e091dc448ea8a66e9e1e80408b1cebb", "key": "title"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "38f5333213e367fda4b080feeef7f895", "key": "href"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2767", "id": "CVE-2015-2767", "lastseen": "2016-09-03T22:24:08", "modified": "2015-03-30T15:45:29", "objectVersion": "1.2", "published": "2015-03-27T10:59:15", "references": ["http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"], "reporter": "NVD", "scanner": [], "title": "CVE-2015-2767", "type": "cve", "viewCount": 1}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T22:24:08"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "abfbbeb3ae3cf622f69d9e4850ef8529"}, {"key": "cvelist", "hash": "ac9504194de30a200a8112d121d059d3"}, {"key": "cvss", "hash": "2bdabeb49c44761f9565717ab0e38165"}, {"key": "description", "hash": "f7d6568f2420a76fb72c69f5a6275444"}, {"key": "href", "hash": "38f5333213e367fda4b080feeef7f895"}, {"key": "modified", "hash": "d59ab48a0126a86ce76d7f4fc15f1f3d"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "c97dcdf62ee4d4dd6b54c9e666963014"}, {"key": "references", "hash": "00be4a0c1a8290bf3909f0c77a87b3f4"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "9e091dc448ea8a66e9e1e80408b1cebb"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "c1a615cf026075ce226ad4a6a1a137b46e330d6f7a0c69add62f288ef75a33e5", "viewCount": 3, "objectVersion": "1.2", "cpe": ["cpe:/a:websense:triton_ap_email:7.8.3"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": [], "enchantments": {"vulnersScore": 6.5}}
{"result": {"kaspersky": [{"id": "KLA10506", "type": "kaspersky", "title": "\r KLA10506Multiple vulnerabilities in Websense products\t\t\t ", "description": "### *CVSS*:\n10.0\n\n### *Detect date*:\n03/25/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Websense products. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, execute or inject arbitrary code, spoof user interface and read or write arbitrary files.\n\n### *Affected products*:\nWebsense TRITON AP-WEB versions earlier than 8.0.0 \nWebsense TRITON V-Series versions earlier than 8.0.0 \nWebsense TRITON AP-EMAIL versions earlier than 8.0.0 \nWebsense Web Security and Filter 7.8.3 versions earlier than hotfix 02 \nWebsense Web Security and Filter 7.8.4 versions earlier than hotfix 01 \nWebsense Web Security Gateway 7.8.3 versions earlier than hotfix 02 \nWebsense Web Security Gateway 7.8.4 versions earlier than hotfix 01 \nWebsense Web Security Gateway Anywhere 7.8.3 versions earlier than hotfix 02 \nWebsense Web Security Gateway Anywhere 7.8.4 versions earlier than hotfix 01 \nWebsense TRITON AP-DATA versions earlier than 8.0.0\n\n### *Solution*:\nUpdate to the latest version\n\n### *Impacts*:\nWLF \n\n### *Related products*:\n[Web Security Gateway Anywhere](<https://threats.kaspersky.com/en/product/Web-Security-Gateway-Anywhere/>)\n\n### *CVE-IDS*:\n[CVE-2014-9712](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9712>) \n[CVE-2015-2761](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2761>) \n[CVE-2015-2762](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2762>) \n[CVE-2015-2763](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2763>) \n[CVE-2015-2764](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2764>) \n[CVE-2015-2765](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2765>) \n[CVE-2015-2766](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2766>) \n[CVE-2015-2767](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2767>) \n[CVE-2015-2768](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2768>) \n[CVE-2015-2769](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2769>) \n[CVE-2015-2770](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2770>) \n[CVE-2015-2771](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2771>) \n[CVE-2015-2772](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2772>) \n[CVE-2015-2773](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2773>) \n[CVE-2015-2746](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2746>) \n[CVE-2015-2747](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2747>) \n[CVE-2015-2748](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2748>) \n[CVE-2014-9711](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9711>) \n[CVE-2015-2702](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2702>) \n[CVE-2015-2703](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2703>)", "published": "2015-03-25T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://threats.kaspersky.com/en/vulnerability/KLA10506", "cvelist": ["CVE-2015-2768", "CVE-2015-2746", "CVE-2015-2771", "CVE-2015-2764", "CVE-2015-2761", "CVE-2014-9711", "CVE-2015-2763", "CVE-2015-2747", "CVE-2015-2702", "CVE-2015-2762", "CVE-2015-2773", "CVE-2015-2769", "CVE-2015-2767", "CVE-2014-9712", "CVE-2015-2770", "CVE-2015-2772", "CVE-2015-2748", "CVE-2015-2765", "CVE-2015-2766", "CVE-2015-2703"], "lastseen": "2018-03-30T14:11:48"}]}}