Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address.
References
Configurations
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2001-07/0129.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/2996 - | |
References | () http://www.securityfocus.com/bid/2998 - | |
References | () http://www.securityfocus.com/bid/3000 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6816 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6817 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6818 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6819 - |
Information
Published : 2001-07-09 04:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-1026
Mitre link : CVE-2001-1026
CVE.ORG link : CVE-2001-1026
JSON object : View
Products Affected
trend_micro
- interscan_applettrap
CWE