Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Proxysg
(Bluecoat)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 11 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2004-11-23 | CVE-2004-0079 | The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference. | Webstar, Mac_os_x, Mac_os_x_server, Converged_communications_server, Intuity_audix, S8300, S8500, S8700, Sg200, Sg203, Sg208, Sg5, Vsu, Cacheos_ca_sa, Proxysg, Firewall\-1, Provider\-1, Vpn\-1, Access_registrar, Application_and_content_networking_software, Call_manager, Ciscoworks_common_management_foundation, Ciscoworks_common_services, Content_services_switch_11500, Css11000_content_services_switch, Css_secure_content_accelerator, Firewall_services_module, Gss_4480_global_site_selector, Gss_4490_global_site_selector, Ios, Mds_9000, Okena_stormwatch, Pix_firewall, Pix_firewall_software, Secure_content_accelerator, Threat_response, Webns, Bsafe_ssl\-J, Freebsd, Aaa_server, Apache\-Based_web_server, Hp\-Ux, Wbem, Speed_technologies_litespeed_web_server, Instant_virtual_extranet, Edirectory, Imanager, Openbsd, Openssl, Enterprise_linux, Enterprise_linux_desktop, Linux, Openssl, Openserver, Sidewinder, Propack, Servercluster, Stonebeat_fullcluster, Stonebeat_securitycluster, Stonebeat_webcluster, Stonegate, Stonegate_vpn_client, Crypto_accelerator_4000, Clientless_vpn_gateway_4400, Tarantella_enterprise, Gsx_server | 7.5 | ||
2004-11-23 | CVE-2004-0081 | OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. | Webstar, Mac_os_x, Mac_os_x_server, Converged_communications_server, Intuity_audix, S8300, S8500, S8700, Sg200, Sg203, Sg208, Sg5, Vsu, Cacheos_ca_sa, Proxysg, Firewall\-1, Provider\-1, Vpn\-1, Access_registrar, Application_and_content_networking_software, Call_manager, Ciscoworks_common_management_foundation, Ciscoworks_common_services, Content_services_switch_11500, Css11000_content_services_switch, Css_secure_content_accelerator, Firewall_services_module, Gss_4480_global_site_selector, Gss_4490_global_site_selector, Ios, Mds_9000, Okena_stormwatch, Pix_firewall, Pix_firewall_software, Secure_content_accelerator, Threat_response, Webns, Bsafe_ssl\-J, Freebsd, Aaa_server, Apache\-Based_web_server, Hp\-Ux, Wbem, Speed_technologies_litespeed_web_server, Instant_virtual_extranet, Edirectory, Imanager, Openbsd, Openssl, Enterprise_linux, Enterprise_linux_desktop, Linux, Openssl, Openserver, Sidewinder, Propack, Servercluster, Stonebeat_fullcluster, Stonebeat_securitycluster, Stonebeat_webcluster, Stonegate, Stonegate_vpn_client, Crypto_accelerator_4000, Clientless_vpn_gateway_4400, Tarantella_enterprise, Gsx_server | N/A | ||
2017-06-08 | CVE-2016-6594 | Blue Coat Advanced Secure Gateway 6.6, CacheFlow 3.4, ProxySG 6.5 and 6.6 allows remote attackers to bypass blocked requests, user authentication, and payload scanning. | Advanced_secure_gateway, Cacheflow, Proxysg | 7.5 | ||
2016-01-08 | CVE-2015-8597 | Open redirect vulnerability in Blue Coat ProxySG 6.5 before 6.5.8.8 and 6.6 and Advanced Secure Gateway (ASG) 6.6 might allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a base64-encoded URL in conjunction with a "clear text" one in a coaching page, as demonstrated by "http://www.%humbug-URL%.local/bluecoat-splash-API?%BASE64-URL%." | Advanced_secure_gateway, Proxysg | 7.4 | ||
2013-09-28 | CVE-2013-5959 | Blue Coat ProxySG before 6.2.14.1, 6.3.x, 6.4.x, and 6.5 before 6.5.2 allows remote attackers to cause a denial of service (memory consumption and dropped connections) via a recursive href in an HTML page, which triggers a large number of HTTP RW pipeline pre-fetch requests. | Proxysg, Proxysgos | N/A | ||
2012-08-26 | CVE-2011-5124 | Stack-based buffer overflow in the BCAAA component before build 60258, as used by Blue Coat ProxySG 4.2.3 through 6.1 and ProxyOne, allows remote attackers to execute arbitrary code via a large packet to the synchronization port (16102/tcp). | Proxyone, Proxysg | N/A | ||
2012-08-26 | CVE-2010-5192 | Cross-site scripting (XSS) vulnerability in the Java Management Console in Blue Coat ProxySG before SGOS 4.3.4.1, 5.x before SGOS 5.4.5.1, 5.5 before SGOS 5.5.4.1, and 6.x before SGOS 6.1.1.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | Proxysg, Proxysg_sg210\-10, Proxysg_sg210\-25, Proxysg_sg210\-5, Proxysg_sg510\-10, Proxysg_sg510\-20, Proxysg_sg510\-25, Proxysg_sg510\-5, Proxysg_sg810\-10, Proxysg_sg810\-20, Proxysg_sg810\-25, Proxysg_sg810\-5, Proxysg_sg9000\-10, Proxysg_sg9000\-20, Proxysg_sg9000\-5, Sgos | N/A | ||
2012-08-26 | CVE-2010-5190 | The Active Content Transformation functionality in Blue Coat ProxySG before SGOS 4.3.4.2, 5.x before SGOS 5.4.5.1, 5.5 before SGOS 5.5.4.1, and 6.x before SGOS 6.1.2.1 allows remote attackers to bypass JavaScript detection via HTML entities. | Proxysg, Proxysg_sg210\-10, Proxysg_sg210\-25, Proxysg_sg210\-5, Proxysg_sg510\-10, Proxysg_sg510\-20, Proxysg_sg510\-25, Proxysg_sg510\-5, Proxysg_sg810\-10, Proxysg_sg810\-20, Proxysg_sg810\-25, Proxysg_sg810\-5, Proxysg_sg9000\-10, Proxysg_sg9000\-20, Proxysg_sg9000\-5, Sgos | N/A | ||
2012-08-26 | CVE-2010-5189 | Blue Coat ProxySG before SGOS 4.3.4.1, 5.x before SGOS 5.4.5.1, 5.5 before SGOS 5.5.4.1, and 6.x before SGOS 6.1.1.1 allows remote authenticated users to execute arbitrary CLI commands by leveraging read-only administrator privileges and establishing an HTTPS session. | Proxysg, Proxysg_sg210\-10, Proxysg_sg210\-25, Proxysg_sg210\-5, Proxysg_sg510\-10, Proxysg_sg510\-20, Proxysg_sg510\-25, Proxysg_sg510\-5, Proxysg_sg810\-10, Proxysg_sg810\-20, Proxysg_sg810\-25, Proxysg_sg810\-5, Proxysg_sg9000\-10, Proxysg_sg9000\-20, Proxysg_sg9000\-5, Sgos | N/A | ||
2009-04-01 | CVE-2009-1211 | Blue Coat ProxySG, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header. | Proxysg, Proxysg_sg210\-10, Proxysg_sg210\-25, Proxysg_sg210\-5, Proxysg_sg510\-10, Proxysg_sg510\-20, Proxysg_sg510\-25, Proxysg_sg510\-5, Proxysg_sg810\-10, Proxysg_sg810\-20, Proxysg_sg810\-25, Proxysg_sg810\-5, Proxysg_sg9000\-10, Proxysg_sg9000\-20, Proxysg_sg9000\-5, Proxysg_va\-10, Proxysg_va\-15, Proxysg_va\-20, Proxysg_va\-5 | N/A |