DansGuardian 2.8 and earlier allows remote attackers to bypass the extension filtering rule via a hex encoded extension or . in the filename.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://dansguardian.org/?page=history - | |
References | () http://marc.info/?l=bugtraq&m=109113126217408&w=2 - | |
References | () http://secunia.com/advisories/12191 - Patch | |
References | () http://securitytracker.com/id?1010817 - | |
References | () http://www.osvdb.org/8270 - | |
References | () http://www.securityfocus.com/bid/10823 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16836 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:52
NVD link : CVE-2004-2065
Mitre link : CVE-2004-2065
CVE.ORG link : CVE-2004-2065
JSON object : View
Products Affected
daniel_barron
- dansguardian
CWE