CVE-2001-1026

Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trend_micro:interscan_applettrap:2.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2001-07/0129.html - Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2001-07/0129.html - Vendor Advisory
References () http://www.securityfocus.com/bid/2996 - () http://www.securityfocus.com/bid/2996 -
References () http://www.securityfocus.com/bid/2998 - () http://www.securityfocus.com/bid/2998 -
References () http://www.securityfocus.com/bid/3000 - () http://www.securityfocus.com/bid/3000 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6816 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6816 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6817 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6817 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6818 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6818 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6819 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6819 -

Information

Published : 2001-07-09 04:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-1026

Mitre link : CVE-2001-1026

CVE.ORG link : CVE-2001-1026


JSON object : View

Products Affected

trend_micro

  • interscan_applettrap