This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote web server contains a web application that is affected by a
remote command execution vulnerability.
The remote application is running Websense Triton, a commercial suite
of web filtering products.
The remote instance of Websense Triton fails to sanitize user-supplied
input specifically affecting the 'explorer_wse/ws_irpt.exe' file. An
attacker can exploit this issue to execute arbitrary commands with
See also :
There are no known workarounds or upgrades to correct this issue.
Websense has released the following Hotfixes to address this
- Hotfix 109 for version 7.1.0
- Hotfix 06 for version 7.1.1
- Hotfix 78 for version 7.5.0
- Hotfix 12 for version 7.5.1
- Hotfix 24 for version 7.6.0
- Hotfix 12 for version 7.6.2
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false