Computer Security
[EN] securityvulns.ru no-pyccku


Cisco PIX / FWSM WebSense content filtering bypass
Published:09.05.2006
Source:
SecurityVulns ID:6111
Type:remote
Threat Level:
5/10
Description:Filter doesn't catch signature in segmented packet.
Affected:CISCO : PIX 7.0
 CISCO : FWSM 2.3
Original documentdocumentCISCO, VSR Advisory: WebSense content filter bypass when deployed in conjunction with Cisco filtering devices (09.05.2006)
 documentVSR Advisories, VSR Advisory: WebSense content filter bypass when deployed in conjunction with Cisco filtering devices (09.05.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod